bdamele / unix-privesc-checkLinks
Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurations that could allow local unprivileged user to escalate to other users (e.g. root) or to access local apps (e.g. databases). This is a collaborative rework of version 1.0
☆87Updated 9 years ago
Alternatives and similar repositories for unix-privesc-check
Users that are interested in unix-privesc-check are comparing it to the libraries listed below
Sorting:
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆243Updated 11 years ago
- Common Findings Database☆101Updated 6 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 11 years ago
- Easy 802.1Q VLAN Hopping☆80Updated last year
- unix wildcard attacks☆136Updated 7 years ago
- An automated SMB relay exploitation script.☆155Updated 8 years ago
- Automated Responder/secretsdump.py cracking☆186Updated 9 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆142Updated 10 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- Modified dropbear server which acts as a client and allows authless login☆126Updated 7 years ago
- Snarf man-in-the-middle / relay suite☆206Updated 8 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- Automatically performs the SMB relay attack☆73Updated 9 years ago
- Attack Knowledge Base☆99Updated 8 years ago
- ☆86Updated 10 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 6 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 9 years ago
- Meterpreter Scripts that I'm working on☆171Updated 6 years ago
- ☆139Updated 8 years ago
- ☆92Updated 7 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆259Updated 9 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- ☆51Updated 9 years ago
- A dumb script for finding dumb coding errors in WordPress plugins☆54Updated 3 years ago
- Search exploits in multiple exploit databases!☆81Updated 5 years ago
- DefCon24☆121Updated 9 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆97Updated 8 years ago