jondonas / linux-exploit-suggester-2Links
Next-Generation Linux Kernel Exploit Suggester
☆1,956Updated 2 years ago
Alternatives and similar repositories for linux-exploit-suggester-2
Users that are interested in linux-exploit-suggester-2 are comparing it to the libraries listed below
Sorting:
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,762Updated 3 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,713Updated 4 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,160Updated 2 years ago
- MS17-010☆2,221Updated 2 years ago
- Linux privilege escalation auditing tool☆6,344Updated last year
- Privilege Escalation Project - Windows / Linux / Mac☆2,596Updated last year
- Windows Exploit Suggester - Next Generation☆4,733Updated last week
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,105Updated last year
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,827Updated 2 years ago
- ☆1,183Updated 8 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,186Updated last year
- Dirty Cow exploit - CVE-2016-5195☆915Updated 5 months ago
- ODAT: Oracle Database Attacking Tool☆1,731Updated last year
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,274Updated 2 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,914Updated 5 years ago
- Simple reverse ICMP shell☆1,610Updated 7 years ago
- Linux Exploit Suggester; based on operating system release number☆1,807Updated 11 years ago
- Monitor linux processes without root permissions☆5,836Updated 2 years ago
- Notes about attacking Jenkins servers☆2,092Updated last year
- SMBMap is a handy SMB enumeration tool☆2,001Updated last week
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,505Updated 2 years ago
- Abusing impersonation privileges through the "Printer Bug"☆2,162Updated 5 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,501Updated 5 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,413Updated 3 months ago
- Automatic SSRF fuzzer and exploitation tool☆3,461Updated 4 months ago
- Automatically exported from code.google.com/p/unix-privesc-check☆1,082Updated 4 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,896Updated 3 years ago
- pwning IPv4 via IPv6☆1,871Updated last year
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,149Updated 10 months ago
- Various webshells. We accept pull requests for additions to this collection.☆1,001Updated 2 years ago