hc0d3r / sudohulk
try privilege escalation changing sudo command
☆118Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for sudohulk
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49Updated 6 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated last year
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 3 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 5 years ago
- unix wildcard attacks☆132Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆86Updated 6 years ago
- put this here because archival reasons.☆28Updated 6 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆92Updated 3 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 7 years ago
- WhiteBox CMS analysis☆68Updated last year
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 5 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated last year
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Updated 7 years ago
- Some scripts and exploits☆142Updated 6 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 4 years ago
- Mimipenguin密码抓取神器☆26Updated 7 years ago
- Stækka Metasploit - Extenting Metasploit☆53Updated 7 years ago
- Hacking challenges☆33Updated 7 years ago
- Test CVE-2018-0296 and extract usernames☆107Updated 5 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago