☆118Feb 22, 2024Updated 2 years ago
Alternatives and similar repositories for su-bruteforce
Users that are interested in su-bruteforce are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆28Sep 16, 2020Updated 5 years ago
- Simple script to download some missing tools in Kali☆33Nov 28, 2020Updated 5 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆31Jun 19, 2022Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Jun 20, 2022Updated 3 years ago
- A quick python script to analyze a given set of passwords and give you some statistics. Used for identifying the most effective hashcat r…☆18Aug 24, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆82Updated this week
- ☆29Mar 2, 2023Updated 3 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆15Nov 2, 2022Updated 3 years ago
- brute-forcing su for fun and possibly profit☆100May 22, 2019Updated 6 years ago
- ☆14Feb 12, 2026Updated 2 months ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- gtfobin checker☆11Oct 25, 2020Updated 5 years ago
- Credential and sensitive information harvester for kubernetes environments.☆12Mar 2, 2021Updated 5 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Windows privilege escalation with cmd☆91Dec 13, 2021Updated 4 years ago
- A python3 and bash PoC for CVE-2021-4034 by Kim Schulz☆22Jan 27, 2022Updated 4 years ago
- Online plugins used by VirtualXposed☆22Nov 24, 2020Updated 5 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 4 years ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆26Apr 10, 2025Updated last year
- Gcash @ Github☆15Sep 30, 2022Updated 3 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- Many times I have asked myself how to maintain access to a compromised WordPress site for the sake of surveillance/data gathering/etc... …☆27May 30, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆50Nov 14, 2023Updated 2 years ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,209Jan 20, 2023Updated 3 years ago
- ☆18Aug 31, 2023Updated 2 years ago
- Resurrecting and updating the best log cleaner☆36Jan 2, 2015Updated 11 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆19May 23, 2022Updated 3 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- Transform your batch (bat) script into one binary.exe☆53Feb 11, 2024Updated 2 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆661Aug 4, 2025Updated 8 months ago
- ☆13Dec 27, 2014Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆23Feb 9, 2018Updated 8 years ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Aug 27, 2021Updated 4 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Jul 30, 2021Updated 4 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 9 months ago
- Switch to JuicyPotato! https://github.com/decoder-it/juicy-potato☆12Feb 8, 2020Updated 6 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13May 18, 2018Updated 7 years ago