Linux privilege escalation auditing tool
☆10Aug 24, 2017Updated 8 years ago
Alternatives and similar repositories for linux-exploit-suggester
Users that are interested in linux-exploit-suggester are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Apr 23, 2017Updated 8 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- ☆18Oct 30, 2017Updated 8 years ago
- 一个红队知识仓库☆11Aug 1, 2023Updated 2 years ago
- A tool for automatically testing whether the upload function can upload webshell☆54Jun 21, 2020Updated 5 years ago
- FxCop plugin for C# or VB.NET projects☆14Jun 28, 2022Updated 3 years ago
- ☆11Nov 20, 2019Updated 6 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- ☆11Apr 8, 2016Updated 9 years ago
- Preparation for OSWE☆47Apr 19, 2020Updated 5 years ago
- CGEN with support for generating IDA Pro IDP modules☆30Dec 28, 2015Updated 10 years ago
- Vectorial symbols for RF design blocks.☆17Jan 16, 2016Updated 10 years ago
- CMSEasy企业建站源代码解密工具(仅支持7.0版本以下)☆13Nov 16, 2018Updated 7 years ago
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Dec 6, 2022Updated 3 years ago
- ☆14May 22, 2024Updated last year
- IDA Pro module for Toshiba MeP processors☆37Dec 31, 2018Updated 7 years ago
- Red Teaming Experiments / Offensive Security / OSCP & Pentesting Cheat Sheets and more☆18Jan 11, 2019Updated 7 years ago
- Statically Compiled Tools that could be used in engagements☆17Aug 29, 2022Updated 3 years ago
- Hscan-Win-Gui☆16Jan 20, 2018Updated 8 years ago
- A repository with various tutorials on how to do things in Pentesting, setup environments and other things☆20Apr 26, 2025Updated 10 months ago
- Sniffer vulnerabilities in http request (chrome extension)☆20Feb 17, 2017Updated 9 years ago
- ☆28Aug 13, 2025Updated 7 months ago
- When you need to access a running Windows system, you can use a dictionary attack tool like acccheck to brute-force the admin's username …☆21Jan 6, 2018Updated 8 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- GyoiThon is a growing penetration test tool using Machine Learning.☆18Apr 28, 2020Updated 5 years ago
- 爆破字典☆16Nov 15, 2017Updated 8 years ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 7 months ago
- Go面试准备:100道大厂Go语言面试题,技术要点,项目实战☆22Mar 19, 2021Updated 5 years ago
- ☆23Oct 11, 2019Updated 6 years ago
- Own collection dictionary☆14Apr 20, 2020Updated 5 years ago
- ARM设备武器化指南☆32May 6, 2020Updated 5 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Pre-OS microcode updater☆43Aug 25, 2018Updated 7 years ago
- Linux锐捷多网卡破解版+断线自动重连脚本+NAT软路由共享脚本☆15Mar 3, 2017Updated 9 years ago
- 各种漏洞poc、Exp的收集或编写☆18Jun 17, 2016Updated 9 years ago
- ☆17May 9, 2017Updated 8 years ago
- Notes on Preparing for Offsec☆28Jul 24, 2023Updated 2 years ago
- EYE-EEG toolbox for combining eye-tracking & EEG☆42Aug 31, 2024Updated last year
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year