liamg / traitorLinks
Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
☆6,988Updated last year
Alternatives and similar repositories for traitor
Users that are interested in traitor are comparing it to the libraries listed below
Sorting:
- Gather and update all available and newest CVEs with their PoC.☆7,170Updated this week
- An HTTP toolkit for security research.☆8,139Updated 6 months ago
- Fast web fuzzer written in Go☆14,592Updated 4 months ago
- Adversary Emulation Framework☆9,864Updated last month
- A fast, simple, recursive content discovery tool written in Rust.☆6,878Updated 2 weeks ago
- ☆2,513Updated 2 years ago
- Monitor linux processes without root permissions☆5,613Updated 2 years ago
- Connect like there is no firewall. Securely.☆1,724Updated last month
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,353Updated 4 months ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,351Updated 5 months ago
- An OOB interaction gathering server and client library☆3,900Updated last week
- A versatile and portable proxy for capturing, manipulating, and replaying HTTP/HTTPS traffic on the go.☆2,899Updated last week
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,787Updated 2 years ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆11,995Updated 9 months ago
- Linux privilege escalation auditing tool☆6,133Updated last year
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,431Updated 2 years ago
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application☆4,840Updated 8 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆18,168Updated 3 weeks ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for att…☆5,385Updated last week
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,354Updated 2 weeks ago
- a drop-in replacement for Nmap powered by shodan.io☆3,097Updated 3 months ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,139Updated last year
- Fast passive subdomain enumeration tool.☆12,170Updated last week
- Windows Exploit Suggester - Next Generation☆4,585Updated this week
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,192Updated 3 weeks ago
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,198Updated this week
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,654Updated 3 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,533Updated 2 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,235Updated 7 months ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,112Updated 6 months ago