irsl / google-osconfig-privesc
Proof of concept about the privilege escalation flaw identified in Google's Osconfig
☆10Updated 4 years ago
Alternatives and similar repositories for google-osconfig-privesc:
Users that are interested in google-osconfig-privesc are comparing it to the libraries listed below
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated 10 months ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆18Updated 5 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 5 years ago
- ☆16Updated last year
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Noob Penetration tester☆11Updated 10 months ago
- ☆20Updated 4 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Hand list of Powershell commands frequently used during penetration tests☆13Updated 6 years ago
- Script Recon Bug Bounty☆10Updated 3 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- This extension provide a Python panel for writing custom proxy script.☆15Updated 5 years ago
- all published scripts devloped by ahmed khlief☆20Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Tools for auditing WAFS☆19Updated 3 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- ☆20Updated 5 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆20Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- ShellC0de Generator☆11Updated 3 years ago