Next-Generation Linux Kernel Exploit Suggester
☆1,961Jan 28, 2023Updated 3 years ago
Alternatives and similar repositories for linux-exploit-suggester-2
Users that are interested in linux-exploit-suggester-2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux privilege escalation auditing tool☆6,431Mar 20, 2026Updated last week
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,877Sep 6, 2023Updated 2 years ago
- Windows Exploit Suggester - Next Generation☆4,789Mar 13, 2026Updated 2 weeks ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,179May 11, 2023Updated 2 years ago
- windows-kernel-exploits Windows平台提权漏洞集合☆8,617Jun 11, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Linux Exploit Suggester; based on operating system release number☆1,811May 19, 2014Updated 11 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,874Dec 25, 2023Updated 2 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,602Oct 4, 2024Updated last year
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,786Jan 31, 2022Updated 4 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,539Mar 20, 2026Updated last week
- Monitor linux processes without root permissions☆5,939Mar 1, 2026Updated 3 weeks ago
- linux-kernel-exploits Linux平台提权漏洞集合☆5,589Jul 13, 2020Updated 5 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,805Apr 25, 2024Updated last year
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆1,995Oct 10, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,747Dec 18, 2021Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,812Dec 4, 2025Updated 3 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,576Mar 20, 2026Updated last week
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,924Aug 17, 2020Updated 5 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,663Nov 28, 2020Updated 5 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,161Mar 6, 2025Updated last year
- Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability detai…☆3,192Feb 15, 2023Updated 3 years ago
- A swiss army knife for pentesting networks☆9,108Dec 6, 2023Updated 2 years ago
- JAWS - Just Another Windows (Enum) Script☆1,931Apr 19, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- The ultimate WinRM shell for hacking/pentesting☆5,306Mar 10, 2026Updated 2 weeks ago
- ODAT: Oracle Database Attacking Tool☆1,745Mar 9, 2026Updated 2 weeks ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,915Sep 7, 2020Updated 5 years ago
- Trying to tame the three-headed dog.☆4,935Nov 14, 2025Updated 4 months ago
- Redis(<=5.0.5) RCE☆1,150Sep 24, 2023Updated 2 years ago
- Six Degrees of Domain Admin☆10,558Mar 2, 2026Updated 3 weeks ago
- Dirty Cow exploit - CVE-2016-5195☆926Jul 30, 2025Updated 7 months ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,516Jan 21, 2020Updated 6 years ago
- A little toolbox to play with Microsoft Kerberos in C☆1,513Dec 14, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A tool to perform Kerberos pre-auth bruteforcing☆3,279Aug 20, 2024Updated last year
- ☆1,194Apr 23, 2017Updated 8 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,131Apr 21, 2024Updated last year
- Web path scanner☆14,114Mar 16, 2026Updated last week
- Neo-reGeorg is a project that seeks to aggressively refactor reGeorg☆3,327Mar 11, 2026Updated 2 weeks ago
- ☆1,490Dec 31, 2022Updated 3 years ago
- MS17-010☆2,233Jun 20, 2023Updated 2 years ago