d4t4s3c / suForceLinks
Obtain a user's system password, this tool uses the su binary to perform a brute force attack until a successful collision occurs.
☆50Updated 5 months ago
Alternatives and similar repositories for suForce
Users that are interested in suForce are comparing it to the libraries listed below
Sorting:
- CTF enumeration tool. It facilitates the Network Pentest☆31Updated 2 weeks ago
- ☆44Updated 4 years ago
- NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications☆332Updated 4 months ago
- Official Kali Linux tool to check all urls of a domain for SQL injections :)☆359Updated last year
- SQLMap Command Generator: A web-based tool to easily generate customizable SQLMap commands for testing SQL injection vulnerabilities. Fea…☆71Updated 9 months ago
- "VMBreaker" is a specialized tool for virtual machine security testing, offering essential, user-friendly features for efficient penetrat…☆13Updated last year
- This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.☆74Updated last year
- Herramientas y utilidades de pentesting, ethical hacking y seguridad ofensiva.☆39Updated 2 months ago
- A webshell that can bypass some system security, all code has been obfuscated to bypass malware scans freely.☆247Updated 9 months ago
- An XSS Exploitation Tool☆318Updated last month
- Bypass WAF SQL Injection SQLMAP☆194Updated 3 years ago
- ☆71Updated 2 years ago
- Unauthenticated Remote Code Execution – Bricks <= 1.9.6☆169Updated last year
- Tool for HackMyVM platform☆19Updated 2 years ago
- ☆876Updated 2 years ago
- A python script to scan for Apache Tomcat server vulnerabilities.☆848Updated last week
- Automatic SSTI detection tool with interactive interface☆1,154Updated this week
- A Burp Suite extension for identifying injection flaws (LFI, RCE, SQLi), authentication/authorization issues, and HTTP 403 access violati…☆374Updated last week
- Local File Inclusion discovery and exploitation tool☆318Updated 7 months ago
- Rockyou.txt Wordlist, but with Strong Passwords only☆34Updated 2 years ago
- The whole collection of Exploits developed by me (Hacker5preme)☆101Updated 3 years ago
- Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits☆166Updated 2 months ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆128Updated last year
- CVE-2024-4367 & CVE-2024-34342 Proof of Concept☆169Updated last year
- GameOver(lay) Ubuntu Privilege Escalation☆128Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆400Updated 7 months ago
- Python exploit code for CVE-2021-4034 (pwnkit)☆169Updated 3 years ago
- Simple and accurate guide for linux privilege escalation tactics☆233Updated last year
- CVE-2022-25765 pdfkit <0.8.6 command injection.☆14Updated 2 years ago
- OpenSSH 2.3 < 7.7 - Username Enumeration☆42Updated last year