etc5had0w / suiderLinks
This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObins
☆26Updated 4 years ago
Alternatives and similar repositories for suider
Users that are interested in suider are comparing it to the libraries listed below
Sorting:
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Updated 6 years ago
- ☆32Updated last year
- Import Nmap scans to Cherrytree☆37Updated 2 years ago
- A simple program to query nmap xml files in the terminal.☆28Updated 5 years ago
- Penetration Testing with Kali Linux☆22Updated 5 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- A collection of tools, notes, & resources I've created during my OSCP certification journey.☆9Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Reconnaissance and Enumeration automation script☆52Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Updated 6 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 5 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26Updated 5 years ago
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- Template project for Offensive Security Exam Documentation☆10Updated 5 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- ☆42Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- A simple, fast port scanner that can work with Nmap.☆10Updated 4 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 5 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated 2 years ago
- A dump of all the scripts that I make☆19Updated 3 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆18Updated 6 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 6 months ago
- Scripts and One-Liners☆22Updated 4 months ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- ☆14Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 4 years ago