ernw / static-toolbox
A collection of statically compiled tools like Nmap and Socat.
☆440Updated last year
Alternatives and similar repositories for static-toolbox
Users that are interested in static-toolbox are comparing it to the libraries listed below
Sorting:
- Linux PAM Backdoor☆328Updated last year
- Sudo Baron Samedit Exploit☆747Updated 3 years ago
- Various kernel exploits☆775Updated last year
- [Linux] Two Privilege Escalation techniques abusing sudo token☆714Updated 6 years ago
- A small reverse shell for Linux & Windows☆599Updated 11 months ago
- Root shell PoC for CVE-2021-3156☆151Updated 3 years ago
- Tool for extracting information from newly spawned processes☆757Updated last week
- Ubuntu OverlayFS Local Privesc☆419Updated last year
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆841Updated last month
- Standalone binaries for Linux/Windows of Impacket's examples☆728Updated last year
- ☆1,153Updated 8 years ago
- Linux 4.10 < 5.1.17 PTRACE_TRACEME local root☆330Updated 5 years ago
- Java RMI enumeration and attack tool.☆732Updated 7 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆280Updated last year
- A tool to make socks connections through HTTP agents☆701Updated 4 years ago
- Automatic exploit generation for simple linux pwn challenges.☆322Updated 2 years ago
- Herramienta para evadir disable_functions y open_basedir☆428Updated last year
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆615Updated 5 years ago
- Simple DNS Rebinding Service☆653Updated 5 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,319Updated 4 years ago
- A modern multiple reverse shell sessions manager written in go☆1,584Updated 2 weeks ago
- Various local exploits☆141Updated 3 years ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,114Updated 2 years ago
- socks4 reverse proxy for penetration testing☆594Updated 6 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆432Updated 2 years ago
- ☆302Updated last year
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,000Updated 3 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,088Updated 4 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆561Updated last year
- Kerberos unconstrained delegation abuse toolkit☆1,294Updated 3 months ago