liamg / traitorLinks
Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
☆7,001Updated last year
Alternatives and similar repositories for traitor
Users that are interested in traitor are comparing it to the libraries listed below
Sorting:
- Gather and update all available and newest CVEs with their PoC.☆7,215Updated last week
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,086Updated 10 months ago
- An OOB interaction gathering server and client library☆3,934Updated last week
- A fast, simple, recursive content discovery tool written in Rust.☆6,968Updated last week
- Fast web fuzzer written in Go☆14,736Updated 4 months ago
- Monitor linux processes without root permissions☆5,650Updated 2 years ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,382Updated 6 months ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,216Updated last month
- Connect like there is no firewall. Securely.☆1,741Updated 2 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆18,305Updated last week
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,266Updated this week
- a drop-in replacement for Nmap powered by shodan.io☆3,103Updated 4 months ago
- Linux privilege escalation auditing tool☆6,172Updated last year
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆10,892Updated this week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,285Updated 11 months ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for att…☆5,413Updated this week
- ☆2,508Updated 2 years ago
- An HTTP toolkit for security research.☆8,202Updated 7 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,597Updated 6 months ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,085Updated 4 months ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,586Updated 2 years ago
- Scanning APK file for URIs, endpoints & secrets.☆5,445Updated 3 weeks ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,573Updated 3 months ago
- Web application fuzzer☆6,280Updated last year
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,360Updated last month
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,887Updated 2 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,379Updated 5 months ago
- A swiss army knife for pentesting networks☆8,912Updated last year
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆24,754Updated this week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,033Updated 3 weeks ago