jondonas / linux-exploit-suggester-2
Next-Generation Linux Kernel Exploit Suggester
☆1,873Updated last year
Alternatives and similar repositories for linux-exploit-suggester-2:
Users that are interested in linux-exploit-suggester-2 are comparing it to the libraries listed below
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,599Updated 2 years ago
- Linux privilege escalation auditing tool☆5,739Updated 11 months ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,475Updated 3 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,490Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,005Updated last year
- Privilege Escalation Project - Windows / Linux / Mac☆2,470Updated 3 months ago
- Windows Exploit Suggester - Next Generation☆4,289Updated last week
- Monitor linux processes without root permissions☆5,059Updated 2 years ago
- ☆1,129Updated 7 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,747Updated 4 months ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,730Updated 2 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,839Updated 4 years ago
- JAWS - Just Another Windows (Enum) Script☆1,723Updated 3 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,850Updated 8 months ago
- MS17-010☆2,157Updated last year
- SMBMap is a handy SMB enumeration tool☆1,825Updated 2 weeks ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,140Updated last year
- Abusing impersonation privileges through the "Printer Bug"☆1,910Updated 4 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,813Updated 2 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,491Updated last year
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆2,929Updated last year
- Notes about attacking Jenkins servers☆2,018Updated 6 months ago
- ODAT: Oracle Database Attacking Tool☆1,634Updated 5 months ago
- Automatic SSRF fuzzer and exploitation tool☆3,051Updated 7 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,271Updated 2 weeks ago
- Mimikatz implementation in pure Python☆2,935Updated 2 weeks ago
- Linux Exploit Suggester; based on operating system release number☆1,780Updated 10 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,563Updated 4 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,435Updated 4 years ago
- Webshell && Backdoor Collection☆1,851Updated 4 years ago