Scripted Local Linux Enumeration & Privilege Escalation Checks
☆10Jan 27, 2014Updated 12 years ago
Alternatives and similar repositories for LinEnum
Users that are interested in LinEnum are comparing it to the libraries listed below
Sorting:
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- ☆20Nov 22, 2016Updated 9 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Feb 10, 2025Updated last year
- Web Exploitation Framework - Beta Release☆24Mar 20, 2015Updated 10 years ago
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 7 years ago
- Ruby web application security assessment console☆62Mar 3, 2019Updated 7 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Sep 24, 2018Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- View tables, check queries and see entity descriptions for a SQLite3 database☆10Oct 15, 2014Updated 11 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Apr 14, 2015Updated 10 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- ☆78Feb 19, 2017Updated 9 years ago
- Resurrecting and updating the best log cleaner☆36Jan 2, 2015Updated 11 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- Published Cisco DevNet Code Exchange : Ansible interface to the Tetration Network Policy Publisher☆14Jul 27, 2020Updated 5 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- MipScope is a cross-platform IDE for students learning assembly on the MIPS architecture. The focus is on a convenient debugging environm…☆17May 11, 2024Updated last year
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- STIG FireFox the Easy Way☆15Jul 26, 2024Updated last year
- ☆21Jul 25, 2017Updated 8 years ago
- Load balancer detection tool. Moved to https://git.sr.ht/~jmbr/halberd☆89May 11, 2017Updated 8 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- A Linux Kernel Module that adds a backdoor to your system☆39Mar 18, 2009Updated 16 years ago
- A ton of helpful tools☆39Oct 8, 2021Updated 4 years ago
- SSH Based Remote Administration Tool☆103Jul 9, 2015Updated 10 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Sep 24, 2012Updated 13 years ago
- cve-2025-24813验证脚本☆11Mar 14, 2025Updated 11 months ago
- Nmap enumeration and script scan automation script☆38Mar 7, 2023Updated 3 years ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 12 years ago
- Research tools for understanding the insides of HBOOT☆19May 13, 2013Updated 12 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago