bdamele / unix-privesc-checkLinks
Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurations that could allow local unprivileged user to escalate to other users (e.g. root) or to access local apps (e.g. databases). This is a collaborative rework of version 1.0
☆87Updated 8 years ago
Alternatives and similar repositories for unix-privesc-check
Users that are interested in unix-privesc-check are comparing it to the libraries listed below
Sorting:
- Common Findings Database☆101Updated 6 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆243Updated 11 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 11 years ago
- unix wildcard attacks☆135Updated 7 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- Automatically performs the SMB relay attack☆73Updated 9 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 9 years ago
- ☆86Updated 10 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 9 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 6 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- An automated SMB relay exploitation script.☆155Updated 8 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆142Updated 10 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 7 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- Automated Responder/secretsdump.py cracking☆186Updated 9 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- Automated enumeration☆30Updated 4 years ago
- Attack Knowledge Base☆100Updated 8 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- Snarf man-in-the-middle / relay suite☆206Updated 8 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆93Updated 9 years ago
- Search exploits in multiple exploit databases!☆81Updated 4 years ago
- Shodan HQ nmap plugin - passively scan targets☆156Updated 9 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago