irsl / google-osconfig-privesc
Proof of concept about the privilege escalation flaw identified in Google's Osconfig
☆10Updated 4 years ago
Alternatives and similar repositories for google-osconfig-privesc:
Users that are interested in google-osconfig-privesc are comparing it to the libraries listed below
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆15Updated 10 months ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- Noob Penetration tester☆11Updated 10 months ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- ☆20Updated 4 years ago
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 4 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆18Updated 5 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Magento Security Scanner☆15Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- CVE-2019-10149 privilege escalation☆9Updated 5 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆19Updated 2 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- ☆20Updated 5 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆37Updated 5 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Docker container for running OWASP WebGoat.NET application☆11Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Accompanying material needed for the workshop☆11Updated last year