Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
☆7,128Mar 12, 2024Updated 2 years ago
Alternatives and similar repositories for traitor
Users that are interested in traitor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,729Apr 22, 2026Updated last week
- Adversary Emulation Framework☆11,081Apr 22, 2026Updated last week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆28,094Updated this week
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,881Aug 18, 2023Updated 2 years ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,635Apr 13, 2026Updated 2 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The Havoc Framework☆8,311Dec 18, 2025Updated 4 months ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,998Jul 12, 2024Updated last year
- 高性能 HTTP 正向代理工具 | A high-performance http tunneling tool☆2,708Feb 2, 2026Updated 2 months ago
- A swiss army knife for pentesting networks☆9,129Dec 6, 2023Updated 2 years ago
- ☆2,246Nov 24, 2023Updated 2 years ago
- Linux privilege escalation auditing tool☆6,470Mar 20, 2026Updated last month
- Fast web fuzzer written in Go☆15,957Updated this week
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,565Aug 20, 2024Updated last year
- Gather and update all available and newest CVEs with their PoC.☆7,705Apr 24, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,498Apr 12, 2026Updated 2 weeks ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,657Aug 28, 2025Updated 8 months ago
- generate CobaltStrike's cross-platform payload☆2,560Nov 20, 2023Updated 2 years ago
- Trying to tame the three-headed dog.☆4,980Nov 14, 2025Updated 5 months ago
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,676Updated this week
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,785Jan 6, 2023Updated 3 years ago
- MDUT - Multiple Database Utilization Tools☆2,212Sep 22, 2023Updated 2 years ago
- 一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972/31656以及log4j,提供一键上传webs…☆1,472Apr 25, 2024Updated 2 years ago
- Monitor linux processes without root permissions☆5,983Mar 1, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Windows Exploit Suggester - Next Generation☆4,836Apr 23, 2026Updated last week
- Impacket is a collection of Python classes for working with network protocols.☆15,671Updated this week
- 👻Stowaway -- Multi-hop Proxy Tool for pentesters☆3,358Mar 3, 2026Updated last month
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,533Apr 17, 2025Updated last year
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆12,237Updated this week
- The swiss army knife of LSASS dumping☆2,094Sep 17, 2024Updated last year
- A Bypass Anti-virus Software Lateral Movement Command Execution Tool☆1,466Jan 20, 2025Updated last year
- 🤖 The Modern Port Scanner 🤖☆19,683Apr 21, 2026Updated last week
- netspy是一款快速探测内网可达网段工具(深信服深蓝实验室天威战队强力驱动)☆2,217Jul 25, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability detai…☆3,198Feb 15, 2023Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,264Apr 22, 2026Updated last week
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,567Mar 21, 2026Updated last month
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆13,131Apr 20, 2026Updated last week
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for att…☆5,907Updated this week
- Neo-reGeorg is a project that seeks to aggressively refactor reGeorg☆3,349Mar 11, 2026Updated last month
- A fast, simple, recursive content discovery tool written in Rust.☆7,701Apr 15, 2026Updated 2 weeks ago