A tool for harvesting sysadmin credentials in Linux
☆19Jul 10, 2024Updated last year
Alternatives and similar repositories for sudo_mitm
Users that are interested in sudo_mitm are comparing it to the libraries listed below
Sorting:
- meterpreter connetion☆24Nov 27, 2017Updated 8 years ago
- A simple shellcode runner☆23Apr 20, 2014Updated 11 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆470Jul 10, 2024Updated last year
- Generate reverse shells in command line with Go !☆20Aug 9, 2020Updated 5 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Mar 12, 2014Updated 12 years ago
- A tool to evaluate the password health of Active Directory accounts.☆43Nov 19, 2024Updated last year
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37May 20, 2013Updated 12 years ago
- Hide processes as a normal user in Linux.☆261Jul 10, 2024Updated last year
- Scripts and other goodies from the pwnieexpress project ported☆10Mar 16, 2014Updated 12 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆22Jul 13, 2020Updated 5 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- ☆29Mar 6, 2017Updated 9 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Projects and POCs☆61Jul 14, 2014Updated 11 years ago
- ☆19May 31, 2017Updated 8 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Recursively searches a directory for any file containing a specified string☆48Jul 5, 2015Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Export your readability links to pocket☆20Sep 6, 2016Updated 9 years ago
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago
- TCP port scanning through SYN flood protected networks☆47Nov 28, 2017Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- Fizzer is an assessment tool for fuzzing FIX messages.☆29Aug 18, 2021Updated 4 years ago
- Translate regular Assembly into Extended Instructions☆88Oct 9, 2012Updated 13 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago