etc5had0w / suiderLinks
This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObins
☆27Updated 4 years ago
Alternatives and similar repositories for suider
Users that are interested in suider are comparing it to the libraries listed below
Sorting:
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Updated 6 years ago
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- Import Nmap scans to Cherrytree☆37Updated 3 years ago
- Nessus Parser☆57Updated 8 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- ☆153Updated last week
- Fly into Gophish with One Click (Infra Automation)☆51Updated 2 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆42Updated 5 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 6 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 7 years ago
- Penetration Testing with Kali Linux☆22Updated 6 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Updated 7 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- ☆80Updated 5 years ago
- ☆32Updated 2 years ago
- ☆48Updated 3 years ago
- Passive internal reconnaissance tool☆72Updated 2 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆63Updated 5 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆68Updated last year
- CherryTree OSCP methodology template☆15Updated 6 years ago
- ☆24Updated 6 years ago
- ☆30Updated 5 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated 3 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 4 years ago
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆27Updated 4 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆84Updated 11 months ago
- OSCP guide and Red Team assessment Guide☆35Updated 5 years ago