☆27Apr 28, 2022Updated 3 years ago
Alternatives and similar repositories for Linux-Privilege-Escalation
Users that are interested in Linux-Privilege-Escalation are comparing it to the libraries listed below
Sorting:
- ☆13May 20, 2022Updated 3 years ago
- ☆13Apr 20, 2021Updated 4 years ago
- All writeups of Author Hakcer404 in Root CTF 2021 Organizer By Bytersec_Squad . User name : Hacker404 Youtube :cyberteach360☆10Apr 18, 2021Updated 4 years ago
- ☆13Apr 6, 2022Updated 3 years ago
- 🎯 Command Injection Payload List☆18Apr 19, 2021Updated 4 years ago
- ☆13Apr 27, 2021Updated 4 years ago
- ☆11Nov 17, 2022Updated 3 years ago
- ☆38Aug 21, 2022Updated 3 years ago
- ☆46Jan 9, 2024Updated 2 years ago
- ☆94Jul 1, 2022Updated 3 years ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Challenges of the final round of the Inter University CTF Competition by BUET CSE Fest 2023☆14Jul 23, 2023Updated 2 years ago
- A list of resources for those interested in getting started in bug bounties☆15Jan 15, 2019Updated 7 years ago
- ☆19Dec 1, 2025Updated 3 months ago
- This repository contains a framework of curated Azure penetration testing tools that are specifically designed to help you identify and m…☆22May 13, 2023Updated 2 years ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆21Aug 20, 2024Updated last year
- ADDS (Active Directory Domain Services)☆28Feb 3, 2026Updated last month
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- Web Penetration Testing Course Materials☆32May 13, 2024Updated last year
- Top 100 Hacking & Security E-Books (Free Download)☆10Feb 26, 2021Updated 5 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- Config files for my GitHub profile.☆14Oct 5, 2025Updated 4 months ago
- Secure NotebookLM MCP Server - Query Google NotebookLM from Claude/AI agents with 14 security hardening layers☆33Updated this week
- Template Nuclei SSTI☆34Nov 18, 2025Updated 3 months ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆36Dec 12, 2023Updated 2 years ago
- A slightly more fun way to disable windows defender☆52May 4, 2025Updated 10 months ago
- ☆14May 14, 2022Updated 3 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Apr 26, 2025Updated 10 months ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- ☆17Oct 5, 2024Updated last year
- A Java library that extends Jakarta Bean Validation capabilities to enable cross-field validation.☆11Nov 2, 2024Updated last year
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆113Updated this week
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆48Jul 28, 2025Updated 7 months ago
- All cheetsheets with main information from HTB CBBH role path in one place.☆114Mar 20, 2024Updated last year