liamg / traitorLinks
Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
☆7,012Updated last year
Alternatives and similar repositories for traitor
Users that are interested in traitor are comparing it to the libraries listed below
Sorting:
- Fast web fuzzer written in Go☆14,844Updated 5 months ago
- A fast, simple, recursive content discovery tool written in Rust.☆7,001Updated this week
- Gather and update all available and newest CVEs with their PoC.☆7,264Updated this week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,288Updated last year
- An OOB interaction gathering server and client library☆3,969Updated last week
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,250Updated 2 months ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,158Updated 7 months ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for att…☆5,446Updated this week
- a drop-in replacement for Nmap powered by shodan.io☆3,111Updated 5 months ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,153Updated 3 weeks ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,403Updated 7 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆18,461Updated this week
- In-depth attack surface mapping and asset discovery☆13,625Updated last month
- Adversary Emulation Framework☆10,045Updated 2 weeks ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,787Updated 2 years ago
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,306Updated this week
- Fast passive subdomain enumeration tool.☆12,346Updated last week
- Connect like there is no firewall. Securely.☆1,748Updated last week
- ☆2,509Updated 2 years ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,711Updated last week
- Monitor linux processes without root permissions☆5,673Updated 2 years ago
- Windows Exploit Suggester - Next Generation☆4,630Updated this week
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,192Updated 5 years ago
- A Workflow Engine for Offensive Security☆5,903Updated 2 months ago
- Linux privilege escalation auditing tool☆6,196Updated last year
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,388Updated 5 months ago
- 🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.☆4,584Updated last week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,465Updated 3 years ago
- An HTTP toolkit for security research.☆8,290Updated 8 months ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆10,989Updated this week