Linux privilege escalation auditing tool
☆10Aug 24, 2017Updated 8 years ago
Alternatives and similar repositories for linux-exploit-suggester
Users that are interested in linux-exploit-suggester are comparing it to the libraries listed below
Sorting:
- ☆22Apr 23, 2017Updated 8 years ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- HTTP proxy with REST API to interact with Azure Blob Storage☆10Apr 23, 2025Updated 10 months ago
- Preparation for OSWE☆47Apr 19, 2020Updated 5 years ago
- A C# PE loader for x64 and x86 PE files.☆47Feb 24, 2026Updated last week
- 一个红队知识仓库☆11Aug 1, 2023Updated 2 years ago
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- Files accompanying helm security blog post☆12Aug 7, 2021Updated 4 years ago
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆14Oct 21, 2024Updated last year
- Information flow analysis tool for Android applications☆12Aug 16, 2021Updated 4 years ago
- Examples from the Android SQlite and ContentProvider Book☆19Mar 28, 2012Updated 13 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- ☆14May 22, 2024Updated last year
- Yet Another Golang binary parser for IDAPro 9.0☆10Sep 13, 2024Updated last year
- CMSEasy企业建站源代码解密工具(仅支持7.0版本以下)☆13Nov 16, 2018Updated 7 years ago
- ☆11Apr 8, 2016Updated 9 years ago
- A tool for automatically testing whether the upload function can upload webshell☆54Jun 21, 2020Updated 5 years ago
- ☆11Nov 20, 2019Updated 6 years ago
- 注入c#控制台到非托管进程☆17May 9, 2022Updated 3 years ago
- Nmap to MongoDB☆11Mar 21, 2019Updated 6 years ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆17Mar 4, 2023Updated 2 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- SendToXray - Burp Suite Extender, Send HTTP request to XRAY proxy.☆11May 22, 2021Updated 4 years ago
- FxCop plugin for C# or VB.NET projects☆14Jun 28, 2022Updated 3 years ago
- ollvm, based on llvm-clang 5.0.2, 6.0.1, 7.0.1, 8.0, 9.0, 9.0.1☆19Apr 4, 2022Updated 3 years ago
- Vectorial symbols for RF design blocks.☆17Jan 16, 2016Updated 10 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12May 28, 2025Updated 9 months ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated last month
- Scripts that can generate gopher payload.☆12Jun 26, 2020Updated 5 years ago
- Burp extension that add a tab to edit Office Open XML document (xlsx,docx,pptx)☆14Nov 26, 2017Updated 8 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- CherryTree OSCP methodology template☆15Dec 10, 2018Updated 7 years ago
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- Own collection dictionary☆14Apr 20, 2020Updated 5 years ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 2 years ago
- Neo4j's client application. Query, visualize, manage.☆13Apr 22, 2021Updated 4 years ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 6 months ago
- ☆13Dec 8, 2022Updated 3 years ago
- ☆12Nov 7, 2022Updated 3 years ago