Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.
☆18Aug 6, 2021Updated 4 years ago
Alternatives and similar repositories for so-check
Users that are interested in so-check are comparing it to the libraries listed below
Sorting:
- Lazily wraps various Linux system auditing tools☆20Oct 26, 2025Updated 4 months ago
- A simple remote scanner for Sitecore CMS☆13May 28, 2024Updated last year
- Integrate GoKart security static analysis to GitHub Actions☆10Jan 11, 2023Updated 3 years ago
- Script which display image (ad) downloaded from the internet.☆13Feb 2, 2020Updated 6 years ago
- Work in progress. (Not finished yet) Slim down (GNU) core utils to 64kB, statically linked with minilib.☆15Oct 30, 2023Updated 2 years ago
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31May 1, 2022Updated 3 years ago
- ☆14Nov 15, 2020Updated 5 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Nov 10, 2020Updated 5 years ago
- Pentesting notes☆19Jan 31, 2026Updated last month
- A simple remote scanner for Liferay Portal☆21Apr 6, 2025Updated 10 months ago
- Reverse shell using socket programming in python☆15Dec 8, 2022Updated 3 years ago
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- Various exploits for SerenityOS☆17Oct 29, 2021Updated 4 years ago
- Spam call (panggilan) untuk mengerjai teman☆22Jul 18, 2022Updated 3 years ago
- Vulnerable Windows 32bit executables for OSCP exam training☆19Dec 12, 2020Updated 5 years ago
- A tiny implementation of a sensible regex subset☆30Jun 22, 2025Updated 8 months ago
- Cpanel Brute Force Tool (Perl)☆17Jan 1, 2014Updated 12 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Tool for fetching all the available waybackmachine snapshot urls☆24Oct 8, 2024Updated last year
- A list of universities with vulnerability disclosure policies☆53Jul 13, 2021Updated 4 years ago
- A feature-incomplete peekahole (pahole) clone that doesn't rely on libdwarves (and doesn't choke on Clang output)☆23Oct 23, 2017Updated 8 years ago
- A Tools For Spoon (https://spooncast.net), to Increase Tap Love, Fans, Viewers Of Fans, Report, and etc.☆10Nov 9, 2022Updated 3 years ago
- Endpoint monitor tool☆21Sep 16, 2020Updated 5 years ago
- ☆23Jul 5, 2020Updated 5 years ago
- Tools for passing OSCP☆40Nov 21, 2025Updated 3 months ago
- ☆24Jan 26, 2021Updated 5 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆26Oct 13, 2019Updated 6 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Apr 22, 2022Updated 3 years ago
- ☆12May 13, 2020Updated 5 years ago
- Objective: Crack a Wi-Fi network’s password using a Wi-Fi adaptor with Kali Linux.☆12Dec 21, 2021Updated 4 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆25Jan 8, 2026Updated last month
- ☆16Jul 28, 2020Updated 5 years ago
- ☆63Jul 23, 2024Updated last year
- Additional resources and references for linux-exploit-suggester.sh☆30Oct 2, 2020Updated 5 years ago
- Reconness Agents Script☆32Jul 25, 2022Updated 3 years ago
- ☆35Feb 10, 2023Updated 3 years ago
- Example of building and running an eBPF program in Rust☆33Sep 27, 2018Updated 7 years ago