bdamele / unix-privesc-checkLinks
Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurations that could allow local unprivileged user to escalate to other users (e.g. root) or to access local apps (e.g. databases). This is a collaborative rework of version 1.0
☆85Updated 8 years ago
Alternatives and similar repositories for unix-privesc-check
Users that are interested in unix-privesc-check are comparing it to the libraries listed below
Sorting:
- Common Findings Database☆100Updated 5 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 11 years ago
- An automated SMB relay exploitation script.☆154Updated 8 years ago
- unix wildcard attacks☆133Updated 7 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆243Updated 10 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Attack Knowledge Base☆100Updated 7 years ago
- Miscellaneous tools and patches that I have written/hacked/forked over the years☆62Updated 13 years ago
- Automated Responder/secretsdump.py cracking☆185Updated 9 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 10 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- ☆57Updated 4 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆140Updated 9 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- Snarf man-in-the-middle / relay suite☆205Updated 8 years ago
- Automatically performs the SMB relay attack☆72Updated 9 years ago
- ☆122Updated 7 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- Easy 802.1Q VLAN Hopping☆80Updated 10 months ago
- Tool to help identify timing attacks☆69Updated 13 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Meterpreter Scripts that I'm working on☆174Updated 6 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- Search exploits in multiple exploit databases!☆81Updated 4 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆165Updated 7 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago