liamg / traitorLinks
Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
β7,019Updated last year
Alternatives and similar repositories for traitor
Users that are interested in traitor are comparing it to the libraries listed below
Sorting:
- Gather and update all available and newest CVEs with their PoC.β7,300Updated this week
- π¦ Make security testing of K8s, Docker, and Containerd easier.β4,430Updated 7 months ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systemsβ12,227Updated last month
- π‘ PoC auto collect from GitHub. β οΈ Be careful Malware.β7,349Updated last week
- β2,506Updated 2 years ago
- Fast web fuzzer written in Goβ15,007Updated 6 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)β18,606Updated this week
- Monitor linux processes without root permissionsβ5,738Updated 2 years ago
- A fast, simple, recursive content discovery tool written in Rust.β7,084Updated 3 weeks ago
- An OOB interaction gathering server and client libraryβ4,013Updated last week
- A toolkit for testing, tweaking and cracking JSON Web Tokensβ6,154Updated 6 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.β5,409Updated 6 months ago
- Fancy reverse and bind shell handlerβ2,831Updated last year
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,295Updated last year
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/β1,785Updated 2 years ago
- Adversary Emulation Frameworkβ10,147Updated this week
- Windows Exploit Suggester - Next Generationβ4,658Updated last week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,466Updated 3 years ago
- Connect like there is no firewall. Securely.β1,757Updated last month
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,284Updated 2 months ago
- a drop-in replacement for Nmap powered by shodan.ioβ3,122Updated 6 months ago
- πΈ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell β¦β7,075Updated 2 years ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attβ¦β5,490Updated last week
- In-depth attack surface mapping and asset discoveryβ13,705Updated last month
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228β3,434Updated 2 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and β¦β1,898Updated 3 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifiβ¦β2,385Updated last month
- A versatile and portable proxy for capturing, manipulating, and replaying HTTP/HTTPS traffic on the go.β2,933Updated 3 weeks ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.β11,245Updated this week
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,766Updated 5 months ago