Post Exploitation Linux Toolkit
☆20Dec 31, 2014Updated 11 years ago
Alternatives and similar repositories for PELT
Users that are interested in PELT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Resurrecting and updating the best log cleaner☆36Jan 2, 2015Updated 11 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Helpful operator notes and techniques in actionable form☆17Aug 11, 2023Updated 2 years ago
- ☆18Mar 28, 2015Updated 11 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- PowerShell HTTP(s) Intercepting Proxy☆14Sep 30, 2014Updated 11 years ago
- a exec jsp shell, simply like weevely php C/S shell.☆15Jun 21, 2022Updated 3 years ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 13 years ago
- Plugin for keepnote to import a XML nmap file☆27Jul 8, 2016Updated 9 years ago
- vmware-backdoor☆35Jul 11, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This version touches disk for registry persistence.☆26Oct 6, 2015Updated 10 years ago
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆11Jun 3, 2017Updated 8 years ago
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- Windows Process Injection Toolkit - plain and simple :)☆28Jul 29, 2018Updated 7 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆820Apr 11, 2023Updated 3 years ago
- Binary resource copier☆96Apr 14, 2025Updated last year
- A simple C library for entropy measurement of byte streams and other data.☆14Dec 9, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 9 years ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆26Apr 14, 2015Updated 11 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 12 years ago
- Twitter Bot to perform advanced search and automated response☆13Dec 22, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Tools made for Tizen Security Analysis☆14Jun 2, 2015Updated 10 years ago
- Windows 8.1 + IE 11 Exploit☆18Jul 26, 2016Updated 9 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- Windows Privesc Check - PowerShell☆66Apr 22, 2022Updated 4 years ago
- Automatically scans for malicious proxies.☆30Mar 7, 2015Updated 11 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- ☆13Apr 21, 2019Updated 7 years ago