A tool for harvesting sysadmin credentials in Linux
☆19Jul 10, 2024Updated last year
Alternatives and similar repositories for sudo_mitm
Users that are interested in sudo_mitm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- meterpreter connetion☆24Nov 27, 2017Updated 8 years ago
- A simple shellcode runner☆23Apr 20, 2014Updated 11 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆470Jul 10, 2024Updated last year
- ☆18Feb 22, 2021Updated 5 years ago
- Generate reverse shells in command line with Go !☆21Aug 9, 2020Updated 5 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Mar 12, 2014Updated 12 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- A tool to evaluate the password health of Active Directory accounts.☆43Nov 19, 2024Updated last year
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37May 20, 2013Updated 12 years ago
- Hide processes as a normal user in Linux.☆261Jul 10, 2024Updated last year
- Scripts and other goodies from the pwnieexpress project ported☆10Mar 16, 2014Updated 12 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆22Jul 13, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆31Feb 10, 2025Updated last year
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- ☆29Mar 6, 2017Updated 9 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Projects and POCs☆61Jul 14, 2014Updated 11 years ago
- ☆19May 31, 2017Updated 8 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Recursively searches a directory for any file containing a specified string☆48Jul 5, 2015Updated 10 years ago
- wow64 syscall filter☆14Nov 12, 2014Updated 11 years ago
- Export your readability links to pocket☆20Sep 6, 2016Updated 9 years ago
- TCP port scanning through SYN flood protected networks☆47Nov 28, 2017Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago