Linux privilege escalation checks (systemd, dbus, socket fun, etc)
☆300Oct 2, 2019Updated 6 years ago
Alternatives and similar repositories for uptux
Users that are interested in uptux are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆683May 9, 2019Updated 6 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆543Apr 14, 2021Updated 5 years ago
- ☆128May 22, 2023Updated 2 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆534Mar 27, 2022Updated 4 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆325Mar 26, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Privilege Escalation Project - Windows / Linux / Mac☆2,600Oct 4, 2024Updated last year
- Generate Mimikatz Golden Ticket commands with ease!☆53Dec 4, 2020Updated 5 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆401Nov 12, 2019Updated 6 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆28Mar 29, 2018Updated 8 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆944May 8, 2019Updated 6 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆407Jun 6, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,417Oct 3, 2020Updated 5 years ago
- Linux privilege escalation via LXD☆141Mar 4, 2020Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆824Nov 15, 2025Updated 5 months ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Tool to create hidden registry keys.☆488Oct 23, 2019Updated 6 years ago
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,337Dec 6, 2023Updated 2 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,128Dec 7, 2022Updated 3 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆732Apr 14, 2019Updated 7 years ago
- Bash post exploitation toolkit☆747Apr 1, 2026Updated 3 weeks ago
- ☆94Nov 16, 2018Updated 7 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,460Mar 11, 2026Updated last month
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆641Dec 9, 2019Updated 6 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PowerShell Runspace Post Exploitation Toolkit☆1,550Aug 2, 2019Updated 6 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- Windows Exploit Suggester - Next Generation☆4,828Updated this week
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆508Sep 23, 2025Updated 7 months ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆382Apr 28, 2020Updated 6 years ago
- ☆197Mar 19, 2020Updated 6 years ago
- Network Pivoting Toolkit☆458Aug 26, 2023Updated 2 years ago