jondonas / linux-exploit-suggester-2
Next-Generation Linux Kernel Exploit Suggester
☆1,858Updated last year
Related projects ⓘ
Alternatives and complementary repositories for linux-exploit-suggester-2
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,569Updated 2 years ago
- Linux privilege escalation auditing tool☆5,660Updated 9 months ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,443Updated 10 months ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆3,971Updated last year
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,422Updated 2 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,449Updated last month
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,794Updated 6 months ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,672Updated 3 months ago
- Monitor linux processes without root permissions☆4,961Updated last year
- Windows Exploit Suggester - Next Generation☆4,230Updated this week
- Automatic SSRF fuzzer and exploitation tool☆3,000Updated 5 months ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,699Updated 2 years ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆2,873Updated last year
- SMBMap is a handy SMB enumeration tool☆1,792Updated last month
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,040Updated last year
- Linux Exploit Suggester; based on operating system release number☆1,779Updated 10 years ago
- Notes about attacking Jenkins servers☆1,966Updated 4 months ago
- MS17-010☆2,146Updated last year
- ☆1,114Updated 7 years ago
- JAWS - Just Another Windows (Enum) Script☆1,697Updated 3 years ago
- Mimikatz implementation in pure Python☆2,879Updated last month
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,241Updated 5 months ago
- ODAT: Oracle Database Attacking Tool☆1,619Updated 3 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,261Updated last week
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,486Updated last year
- Automatically exported from code.google.com/p/unix-privesc-check☆1,035Updated 3 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,829Updated 4 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,684Updated 3 years ago
- Abusing impersonation privileges through the "Printer Bug"☆1,872Updated 4 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,795Updated 2 years ago