A tool for harvesting sysadmin credentials in Linux
☆19Jul 10, 2024Updated last year
Alternatives and similar repositories for sudo_mitm
Users that are interested in sudo_mitm are comparing it to the libraries listed below
Sorting:
- A simple shellcode runner☆22Apr 20, 2014Updated 11 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- meterpreter connetion☆24Nov 27, 2017Updated 8 years ago
- ☆16May 9, 2016Updated 9 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Hide processes as a normal user in Linux.☆261Jul 10, 2024Updated last year
- LG Root Exploit☆36Jun 26, 2013Updated 12 years ago
- A small Php package to fetch archive url snapshots from archive.org. Using it you can fetch complete list of snapshot urls of any year or…☆19Jun 20, 2021Updated 4 years ago
- ☆11Feb 15, 2016Updated 10 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆470Jul 10, 2024Updated last year
- Investigation data from two reports around the Blue Coat networking kit.☆17Apr 15, 2014Updated 11 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated 11 months ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Scripts and other goodies from the pwnieexpress project ported☆10Mar 16, 2014Updated 11 years ago
- libopcodes-based disassembler☆35Aug 8, 2020Updated 5 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- repo with compromised keys and such☆23Dec 29, 2022Updated 3 years ago
- Use security tools from within IRC.☆24Mar 20, 2012Updated 13 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- PowerShell module for the exploitation and testing☆16Jul 5, 2015Updated 10 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37May 20, 2013Updated 12 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Mar 12, 2014Updated 11 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago