bcoles / so-check
Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.
☆17Updated 3 years ago
Related projects: ⓘ
- Remove Offensive and Profane Words from Wordlists☆13Updated last year
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago
- Shell hunter for AF☆34Updated 2 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆15Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆22Updated 3 years ago
- Free Email Providers☆10Updated last year
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 2 years ago
- ☆10Updated this week
- ☆12Updated this week
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆25Updated 2 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- Local Privilege Escalation Miner☆22Updated 2 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆34Updated 4 months ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆17Updated 3 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆21Updated 2 years ago
- pwncat windows c2 components☆17Updated 3 years ago
- Standardizing Security Titles☆13Updated last year
- Collection of things made during my SLAE 32-bit journey☆14Updated 2 years ago
- ☆20Updated this week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 5 months ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆9Updated 3 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆30Updated 3 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆19Updated 8 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Updated 3 years ago