irsl / google-osconfig-privesc
Proof of concept about the privilege escalation flaw identified in Google's Osconfig
☆10Updated 4 years ago
Alternatives and similar repositories for google-osconfig-privesc:
Users that are interested in google-osconfig-privesc are comparing it to the libraries listed below
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆15Updated 9 months ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Everything about xss protection technology☆15Updated 5 years ago
- An exotic service bruteforce tool.☆12Updated 2 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 4 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- ☆14Updated 3 years ago
- Noob Penetration tester☆11Updated 9 months ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 3 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆18Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 5 years ago
- ☆20Updated 4 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- Exactly what it sounds like, which is something rad☆21Updated 2 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Docker container for running OWASP WebGoat.NET application☆11Updated 6 years ago