Linux privilege escalation checks (systemd, dbus, socket fun, etc)
☆298Oct 2, 2019Updated 6 years ago
Alternatives and similar repositories for uptux
Users that are interested in uptux are comparing it to the libraries listed below
Sorting:
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆682May 9, 2019Updated 6 years ago
- ☆128May 22, 2023Updated 2 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆536Mar 27, 2022Updated 3 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆541Apr 14, 2021Updated 4 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 6 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,602Oct 4, 2024Updated last year
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆402Jun 6, 2020Updated 5 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,416Oct 3, 2020Updated 5 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆402Nov 12, 2019Updated 6 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Tool to create hidden registry keys.☆491Oct 23, 2019Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Network Pivoting Toolkit☆457Aug 26, 2023Updated 2 years ago
- HTA encryption tool for RedTeams☆1,424Nov 9, 2022Updated 3 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆826Nov 15, 2025Updated 3 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 5 months ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,132Dec 7, 2022Updated 3 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,322Dec 6, 2023Updated 2 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆620Oct 6, 2025Updated 4 months ago
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆291Jan 5, 2026Updated last month
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆344Dec 6, 2018Updated 7 years ago
- ☆198Mar 19, 2020Updated 5 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,439Oct 3, 2025Updated 4 months ago
- Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched☆584Jan 31, 2020Updated 6 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆642Dec 9, 2019Updated 6 years ago
- ☆301Nov 9, 2020Updated 5 years ago
- Bash post exploitation toolkit☆743Jul 19, 2023Updated 2 years ago
- For all your network pentesting needs☆154Jun 26, 2024Updated last year
- ☆350Feb 21, 2022Updated 4 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆733Apr 14, 2019Updated 6 years ago