liamg / traitorLinks
Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
☆7,075Updated last year
Alternatives and similar repositories for traitor
Users that are interested in traitor are comparing it to the libraries listed below
Sorting:
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,368Updated 2 months ago
- Monitor linux processes without root permissions☆5,802Updated 2 years ago
- Fast web fuzzer written in Go☆15,248Updated 7 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,784Updated 2 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,448Updated 7 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆18,905Updated this week
- Gather and update all available and newest CVEs with their PoC.☆7,433Updated this week
- Connect like there is no firewall. Securely.☆1,781Updated 3 weeks ago
- Windows Exploit Suggester - Next Generation☆4,712Updated last week
- A fast, simple, recursive content discovery tool written in Rust.☆7,280Updated 2 weeks ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,319Updated last month
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,489Updated last month
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,550Updated 3 weeks ago
- Linux privilege escalation auditing tool☆6,300Updated last year
- An OOB interaction gathering server and client library☆4,080Updated this week
- Adversary Emulation Framework☆10,337Updated this week
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,419Updated this week
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,253Updated 7 months ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for att…☆5,566Updated this week
- a drop-in replacement for Nmap powered by shodan.io☆3,147Updated 7 months ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,740Updated 2 years ago
- 🔪 Leak git repositories from misconfigured websites☆1,586Updated last week
- A Workflow Engine for Offensive Security☆5,989Updated 4 months ago
- Fancy reverse and bind shell handler☆2,852Updated last year
- ☆2,509Updated 2 years ago
- A swiss army knife for pentesting networks☆8,989Updated 2 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,906Updated 3 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,819Updated 3 weeks ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,350Updated 3 weeks ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,400Updated 2 months ago