Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
☆7,111Mar 12, 2024Updated last year
Alternatives and similar repositories for traitor
Users that are interested in traitor are comparing it to the libraries listed below
Sorting:
- Adversary Emulation Framework☆10,717Updated this week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,340Feb 14, 2026Updated 2 weeks ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,194Updated this week
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,874Aug 18, 2023Updated 2 years ago
- The Havoc Framework☆8,190Dec 18, 2025Updated 2 months ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,961Jul 12, 2024Updated last year
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,562Updated this week
- A swiss army knife for pentesting networks☆9,082Dec 6, 2023Updated 2 years ago
- Fast web fuzzer written in Go☆15,637Apr 24, 2025Updated 10 months ago
- Gather and update all available and newest CVEs with their PoC.☆7,551Feb 22, 2026Updated last week
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,415Dec 20, 2025Updated 2 months ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,643Aug 28, 2025Updated 6 months ago
- Linux privilege escalation auditing tool☆6,401Feb 19, 2026Updated last week
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,562Aug 20, 2024Updated last year
- ☆2,198Nov 24, 2023Updated 2 years ago
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,548Updated this week
- Trying to tame the three-headed dog.☆4,893Nov 14, 2025Updated 3 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,493Updated this week
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆11,983Updated this week
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,479Nov 16, 2025Updated 3 months ago
- Windows Exploit Suggester - Next Generation☆4,766Updated this week
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,782Jan 6, 2023Updated 3 years ago
- Monitor linux processes without root permissions☆5,891Jan 17, 2023Updated 3 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,504Apr 17, 2025Updated 10 months ago
- generate CobaltStrike's cross-platform payload☆2,542Nov 20, 2023Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,488Feb 16, 2026Updated last week
- 高性能 HTTP 正向代理工具 | A high-performance http tunneling tool☆2,673Feb 2, 2026Updated 3 weeks ago
- 🤖 The Modern Port Scanner 🤖☆19,306Feb 20, 2026Updated last week
- A fast, simple, recursive content discovery tool written in Rust.☆7,544Feb 8, 2026Updated 3 weeks ago
- The swiss army knife of LSASS dumping☆2,072Sep 17, 2024Updated last year
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆12,698Updated this week
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for att…☆5,775Updated this week
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,462Jul 8, 2025Updated 7 months ago
- Privilege Escalation Enumeration Script for Windows☆3,697Jan 30, 2026Updated last month
- Fast passive subdomain enumeration tool.☆13,124Feb 19, 2026Updated last week
- A Bypass Anti-virus Software Lateral Movement Command Execution Tool☆1,464Jan 20, 2025Updated last year
- 👻Stowaway -- Multi-hop Proxy Tool for pentesters☆3,315Apr 5, 2025Updated 10 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,259Updated this week
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆2,179Aug 15, 2024Updated last year