Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
☆7,110Mar 12, 2024Updated 2 years ago
Alternatives and similar repositories for traitor
Users that are interested in traitor are comparing it to the libraries listed below
Sorting:
- Adversary Emulation Framework☆10,838Mar 15, 2026Updated last week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,539Updated this week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,492Updated this week
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,880Aug 18, 2023Updated 2 years ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,583Feb 23, 2026Updated 3 weeks ago
- The Havoc Framework☆8,245Dec 18, 2025Updated 3 months ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,963Jul 12, 2024Updated last year
- 高性能 HTTP 正向代理工具 | A high-performance http tunneling tool☆2,683Feb 2, 2026Updated last month
- A swiss army knife for pentesting networks☆9,100Dec 6, 2023Updated 2 years ago
- ☆2,205Nov 24, 2023Updated 2 years ago
- Linux privilege escalation auditing tool☆6,420Feb 19, 2026Updated last month
- Fast web fuzzer written in Go☆15,750Apr 24, 2025Updated 10 months ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,562Aug 20, 2024Updated last year
- Gather and update all available and newest CVEs with their PoC.☆7,624Updated this week
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,433Updated this week
- Automation for internal Windows Penetrationtest / AD-Security☆3,650Aug 28, 2025Updated 6 months ago
- generate CobaltStrike's cross-platform payload☆2,547Nov 20, 2023Updated 2 years ago
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,581Updated this week
- Trying to tame the three-headed dog.☆4,920Nov 14, 2025Updated 4 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,785Jan 6, 2023Updated 3 years ago
- MDUT - Multiple Database Utilization Tools☆2,194Sep 22, 2023Updated 2 years ago
- Monitor linux processes without root permissions☆5,927Mar 1, 2026Updated 2 weeks ago
- 一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972/31656以及log4j,提供一键上传webs…☆1,468Apr 25, 2024Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆15,560Updated this week
- Windows Exploit Suggester - Next Generation☆4,789Mar 13, 2026Updated last week
- 👻Stowaway -- Multi-hop Proxy Tool for pentesters☆3,339Mar 3, 2026Updated 2 weeks ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,518Apr 17, 2025Updated 11 months ago
- The swiss army knife of LSASS dumping☆2,081Sep 17, 2024Updated last year
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆12,058Updated this week
- 🤖 The Modern Port Scanner 🤖☆19,453Mar 14, 2026Updated last week
- A Bypass Anti-virus Software Lateral Movement Command Execution Tool☆1,464Jan 20, 2025Updated last year
- netspy是一款快速探测内网可达网段工具( 深信服深蓝实验室天威战队强力驱动)☆2,203Jul 25, 2023Updated 2 years ago
- Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability detai…☆3,192Feb 15, 2023Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,106Updated this week
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,510Nov 16, 2025Updated 4 months ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for att…☆5,820Updated this week
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆12,816Mar 3, 2026Updated 2 weeks ago
- Neo-reGeorg is a project that seeks to aggressively refactor reGeorg☆3,327Mar 11, 2026Updated last week
- A fast, simple, recursive content discovery tool written in Rust.☆7,606Feb 8, 2026Updated last month