ernw / static-toolbox
A collection of statically compiled tools like Nmap and Socat.
☆429Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for static-toolbox
- Linux PAM Backdoor☆314Updated last year
- Standalone binaries for Linux/Windows of Impacket's examples☆718Updated last year
- Sudo Baron Samedit Exploit☆737Updated 2 years ago
- Various kernel exploits☆747Updated 8 months ago
- Herramienta para evadir disable_functions y open_basedir☆397Updated last year
- Linux 4.10 < 5.1.17 PTRACE_TRACEME local root☆327Updated 5 years ago
- ☆1,114Updated 7 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆905Updated 6 years ago
- Automatic exploit generation for simple linux pwn challenges.☆317Updated last year
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆928Updated last year
- [Linux] Two Privilege Escalation techniques abusing sudo token☆701Updated 5 years ago
- Tool for extracting information from newly spawned processes☆735Updated 2 years ago
- socks4 reverse proxy for penetration testing☆559Updated 6 years ago
- Token Privilege Research☆782Updated 7 years ago
- Kerberos unconstrained delegation abuse toolkit☆1,150Updated this week
- PoC for CVE-2021-3156 (sudo heap overflow)☆431Updated 2 years ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆576Updated 4 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,043Updated 3 years ago
- Ubuntu OverlayFS Local Privesc☆408Updated 7 months ago
- The great impacket example scripts compiled for Windows☆919Updated 5 years ago
- Root shell PoC for CVE-2021-3156☆145Updated 2 years ago
- ☆154Updated 2 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆555Updated 6 months ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆662Updated 5 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆799Updated last year
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆422Updated 2 years ago
- A small reverse shell for Linux & Windows☆586Updated 5 months ago
- ☆135Updated 2 years ago
- Abusing impersonation privileges through the "Printer Bug"☆1,876Updated 4 years ago
- Exploit for zerologon cve-2020-1472☆632Updated 4 years ago