infinite-horizon219 / LinEnumView external linksLinks
Scripted Local Linux Enumeration & Privilege Escalation Checks
☆10Jan 27, 2014Updated 12 years ago
Alternatives and similar repositories for LinEnum
Users that are interested in LinEnum are comparing it to the libraries listed below
Sorting:
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- ☆20Nov 22, 2016Updated 9 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Feb 10, 2025Updated last year
- Ruby web application security assessment console☆62Mar 3, 2019Updated 6 years ago
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 7 years ago
- Web Exploitation Framework - Beta Release☆24Mar 20, 2015Updated 10 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Sep 24, 2018Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Apr 14, 2015Updated 10 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- View tables, check queries and see entity descriptions for a SQLite3 database☆10Oct 15, 2014Updated 11 years ago
- ☆78Feb 19, 2017Updated 8 years ago
- Resurrecting and updating the best log cleaner☆36Jan 2, 2015Updated 11 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- MipScope is a cross-platform IDE for students learning assembly on the MIPS architecture. The focus is on a convenient debugging environm…☆17May 11, 2024Updated last year
- ☆21Jul 25, 2017Updated 8 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- Published Cisco DevNet Code Exchange : Ansible interface to the Tetration Network Policy Publisher☆14Jul 27, 2020Updated 5 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- STIG FireFox the Easy Way☆15Jul 26, 2024Updated last year
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- Load balancer detection tool. Moved to https://git.sr.ht/~jmbr/halberd☆89May 11, 2017Updated 8 years ago
- A Linux Kernel Module that adds a backdoor to your system☆39Mar 18, 2009Updated 16 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Sep 24, 2012Updated 13 years ago
- A ton of helpful tools☆39Oct 8, 2021Updated 4 years ago
- SSH Based Remote Administration Tool☆103Jul 9, 2015Updated 10 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆10Jan 10, 2017Updated 9 years ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago