liamg / traitor
Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
☆6,602Updated 6 months ago
Related projects: ⓘ
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆15,744Updated this week
- One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️☆5,542Updated 2 months ago
- Fast web fuzzer written in Go☆12,270Updated 2 months ago
- An HTTP toolkit for security research.☆6,055Updated 4 months ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆10,628Updated 3 weeks ago
- Adversary Emulation Framework☆8,239Updated this week
- Infection Monkey - An open-source adversary emulation platform☆6,626Updated this week
- Fast and customizable vulnerability scanner based on simple YAML based DSL.☆19,931Updated this week
- Gather and update all available and newest CVEs with their PoC.☆6,445Updated this week
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆7,380Updated this week
- A fast, simple, recursive content discovery tool written in Rust.☆5,790Updated this week
- Directory/File, DNS and VHost busting tool written in Go☆9,580Updated last week
- Fast passive subdomain enumeration tool.☆9,963Updated this week
- Monitor linux processes without root permissions☆4,854Updated last year
- In-depth attack surface mapping and asset discovery☆11,798Updated this week
- Impacket is a collection of Python classes for working with network protocols.☆13,291Updated 2 weeks ago
- A pretty sweet vulnerability scanner☆4,052Updated 6 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆3,983Updated last month
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆6,519Updated 10 months ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆5,282Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆10,634Updated 3 weeks ago
- 🤖 The Modern Port Scanner 🤖☆14,181Updated this week
- A swiss army knife for pentesting networks☆8,355Updated 9 months ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆16,263Updated this week
- A Workflow Engine for Offensive Security☆5,269Updated 3 months ago
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆6,402Updated this week
- An OOB interaction gathering server and client library☆3,319Updated this week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,340Updated last week
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆9,005Updated this week
- Scanning APK file for URIs, endpoints & secrets.☆4,856Updated 4 months ago