liamg / traitorLinks
Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
☆7,075Updated last year
Alternatives and similar repositories for traitor
Users that are interested in traitor are comparing it to the libraries listed below
Sorting:
- Gather and update all available and newest CVEs with their PoC.☆7,433Updated this week
- Adversary Emulation Framework☆10,337Updated this week
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,921Updated last year
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,319Updated last month
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,419Updated this week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆18,905Updated this week
- Fast passive subdomain enumeration tool.☆12,682Updated this week
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for att…☆5,566Updated this week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆25,809Updated last week
- Monitor linux processes without root permissions☆5,794Updated 2 years ago
- Fast web fuzzer written in Go☆15,210Updated 7 months ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,437Updated 3 years ago
- httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.☆9,250Updated last week
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,368Updated 2 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆6,963Updated last week
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,474Updated last month
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,448Updated 7 months ago
- Linux privilege escalation auditing tool☆6,300Updated last year
- Scanning APK file for URIs, endpoints & secrets.☆5,736Updated 3 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,708Updated 5 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,784Updated 2 years ago
- A swiss army knife for pentesting networks☆8,989Updated 2 years ago
- A fast, simple, recursive content discovery tool written in Rust.☆7,280Updated 2 weeks ago
- Windows Exploit Suggester - Next Generation☆4,712Updated last week
- Connect like there is no firewall. Securely.☆1,781Updated 3 weeks ago
- An HTTP toolkit for security research.☆9,029Updated 10 months ago
- An OOB interaction gathering server and client library☆4,080Updated this week
- ☆2,509Updated 2 years ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,586Updated 3 weeks ago
- The Havoc Framework☆7,992Updated 5 months ago