liamg / traitorLinks
Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
β7,095Updated last year
Alternatives and similar repositories for traitor
Users that are interested in traitor are comparing it to the libraries listed below
Sorting:
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)β19,151Updated this week
- π‘ PoC auto collect from GitHub. β οΈ Be careful Malware.β7,494Updated this week
- Monitor linux processes without root permissionsβ5,851Updated 3 years ago
- Fast web fuzzer written in Goβ15,457Updated 9 months ago
- Gather and update all available and newest CVEs with their PoC.β7,511Updated this week
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.β12,538Updated this week
- π¦ Make security testing of K8s, Docker, and Containerd easier.β4,544Updated 2 months ago
- An HTTP toolkit for security research.β9,262Updated 11 months ago
- β2,511Updated 3 years ago
- Adversary Emulation Frameworkβ10,560Updated last week
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/β1,784Updated 3 years ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,378Updated last month
- Fancy reverse and bind shell handlerβ2,864Updated last year
- A fast, simple, recursive content discovery tool written in Rust.β7,441Updated this week
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and β¦β1,921Updated 3 years ago
- Connect like there is no firewall. Securely.β1,796Updated 2 months ago
- Linux privilege escalation auditing toolβ6,362Updated last year
- The Havoc Frameworkβ8,109Updated last month
- A toolkit for testing, tweaking and cracking JSON Web Tokensβ6,330Updated 8 months ago
- An OOB interaction gathering server and client libraryβ4,137Updated last week
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and nβ¦β10,810Updated this week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,473Updated 3 years ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Eβ¦β8,423Updated 2 months ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228β3,440Updated 3 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β7,094Updated 2 weeks ago
- Quickly discover exposed hosts on the internet using multiple search engines.β2,781Updated 2 weeks ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.β5,479Updated 9 months ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attβ¦β5,689Updated this week
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web applicationβ4,982Updated last year
- Fast passive subdomain enumeration tool.β12,885Updated 2 weeks ago