etc5had0w / suider
This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObins
☆24Updated 4 years ago
Alternatives and similar repositories for suider:
Users that are interested in suider are comparing it to the libraries listed below
- Import Nmap scans to Cherrytree☆36Updated 2 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Updated 6 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Updated 6 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- Template project for Offensive Security Exam Documentation☆10Updated 5 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 5 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26Updated 4 years ago
- ☆32Updated last year
- A simple, fast port scanner that can work with Nmap.☆10Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- ☆28Updated 4 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 6 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 5 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆18Updated 6 years ago
- Mass target enumeration☆28Updated 3 years ago
- A collection of tools, notes, & resources I've created during my OSCP certification journey.☆9Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- ☆41Updated 4 years ago
- Simple script to generate commands to achieve reverse shells.☆11Updated 5 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago