carlospolop / su-bruteforceView external linksLinks
☆112Feb 22, 2024Updated last year
Alternatives and similar repositories for su-bruteforce
Users that are interested in su-bruteforce are comparing it to the libraries listed below
Sorting:
- Simple script to download some missing tools in Kali☆33Nov 28, 2020Updated 5 years ago
- ☆28Sep 16, 2020Updated 5 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Jun 19, 2022Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Jun 20, 2022Updated 3 years ago
- ☆79Jan 30, 2026Updated 2 weeks ago
- ☆30Mar 2, 2023Updated 2 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆14Nov 2, 2022Updated 3 years ago
- brute-forcing su for fun and possibly profit☆99May 22, 2019Updated 6 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Jul 30, 2021Updated 4 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆50Nov 14, 2023Updated 2 years ago
- Online plugins used by VirtualXposed☆22Nov 24, 2020Updated 5 years ago
- Windows privilege escalation with cmd☆90Dec 13, 2021Updated 4 years ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆27Apr 10, 2025Updated 10 months ago
- ☆238Aug 23, 2023Updated 2 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 3 years ago
- purplestorm writeup collection☆29Updated this week
- Custom exploits☆28Apr 8, 2024Updated last year
- Simultaneously execute various subdomain enumeration tools and aggregate results.☆42Jun 19, 2024Updated last year
- ☆23Feb 9, 2018Updated 8 years ago
- AIS3 2020 pre-exam writeup☆10Jun 30, 2020Updated 5 years ago
- ☆12Updated this week
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 7 months ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Aug 27, 2021Updated 4 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- gtfobin checker☆11Oct 25, 2020Updated 5 years ago
- A curated collection of scripts for kernel-related devops☆13Nov 23, 2023Updated 2 years ago
- Cryptonita - cryptanalysis swiss army knife☆14Jan 24, 2026Updated 3 weeks ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- ESP8266 ROM Bootloader utility☆12Jun 28, 2020Updated 5 years ago
- Crack your non-rooted android device pin code with 100% guarantee aslong as usb debugging has been enable. Wbruter also has support for p…☆14Aug 4, 2019Updated 6 years ago
- Windows DPAPI laboratory☆12Mar 5, 2018Updated 7 years ago
- ☆13Dec 27, 2014Updated 11 years ago
- Credential and sensitive information harvester for kubernetes environments.☆11Mar 2, 2021Updated 4 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆257Aug 9, 2024Updated last year