Scripted Local Linux Enumeration & Privilege Escalation Checks
☆10Jan 27, 2014Updated 12 years ago
Alternatives and similar repositories for LinEnum
Users that are interested in LinEnum are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Resurrecting and updating the best log cleaner☆36Jan 2, 2015Updated 11 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- morphHTA - Morphing Cobalt Strike's evil.HTA☆11Jun 3, 2017Updated 8 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Online machine learning algorithms (based on OLL C++ library)☆22Jun 29, 2017Updated 8 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Sep 24, 2018Updated 7 years ago
- ☆20Nov 22, 2016Updated 9 years ago
- STIG FireFox the Easy Way☆15Jul 26, 2024Updated last year
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 7 years ago
- JWT Debugger extension based on JWT.io☆12Nov 21, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Tool to brute-force the passphrase of a RSA private key in PEM format.☆12Dec 11, 2014Updated 11 years ago
- All the data about Pyvo meetups / Všechna data o Pyvo srazech☆18Mar 20, 2026Updated last week
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- ☆78Feb 19, 2017Updated 9 years ago
- A Linux Kernel Module that adds a backdoor to your system☆39Mar 18, 2009Updated 17 years ago
- ☆22Jun 28, 2016Updated 9 years ago
- Add a global delay to Command-Q to stop accidental app quits.☆11Mar 8, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Cfm Shell v3.0 edition☆13Jun 16, 2013Updated 12 years ago
- A single PHP file for quickly viewing VPS stats, rebooting, shutting down and booting the VPS via the SolusVM Client API..☆13Nov 5, 2015Updated 10 years ago
- ☆19Nov 28, 2024Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- A grafana Dockerfile for OpenShift☆10Mar 13, 2020Updated 6 years ago
- It's an RSA-cracker, that uses Fermat's factorization method to get p and q.☆15Dec 19, 2015Updated 10 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- Repository of community OS customization scripts for Instant Clone cmdlets☆16Aug 10, 2015Updated 10 years ago
- PowerShell module for manipulating Microsoft OneNote data using the Microsoft Graph REST API.☆11Jul 15, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Script to identify new host using the subjectAltName (Subject Alternate Name) extension of a x509 HTTP TLS certificate.☆12Dec 25, 2020Updated 5 years ago
- Ruby web application security assessment console☆62Mar 3, 2019Updated 7 years ago
- Generic fuzzing wordlist to test for SQLi. Merged from different SQLi wordlists.☆17Jul 24, 2021Updated 4 years ago
- Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions☆12Apr 24, 2017Updated 8 years ago
- Ansible Playbooks for SimeonOnSecurity's STIG Scripts☆15Jul 26, 2024Updated last year
- A Scantime Crypter coded in Python 2.7☆15Aug 26, 2017Updated 8 years ago
- Published Cisco DevNet Code Exchange : Ansible interface to the Tetration Network Policy Publisher☆14Jul 27, 2020Updated 5 years ago