liamg / traitorLinks
Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
☆7,065Updated last year
Alternatives and similar repositories for traitor
Users that are interested in traitor are comparing it to the libraries listed below
Sorting:
- A fast, simple, recursive content discovery tool written in Rust.☆7,196Updated this week
- Gather and update all available and newest CVEs with their PoC.☆7,376Updated this week
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,382Updated this week
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,458Updated 2 weeks ago
- Fast web fuzzer written in Go☆15,141Updated 6 months ago
- Connect like there is no firewall. Securely.☆1,761Updated last month
- Fast passive subdomain enumeration tool.☆12,572Updated this week
- Monitor linux processes without root permissions☆5,771Updated 2 years ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for att…☆5,527Updated last week
- Linux privilege escalation auditing tool☆6,264Updated last year
- An OOB interaction gathering server and client library☆4,034Updated this week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆18,771Updated last week
- Various tips & tricks☆3,560Updated 2 months ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,292Updated 2 weeks ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,311Updated 2 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,309Updated last year
- 🔪 Leak git repositories from misconfigured websites☆1,588Updated 2 years ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,188Updated 6 months ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,904Updated last year
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,607Updated 8 months ago
- ☆2,509Updated 2 years ago
- An HTTP toolkit for security research.☆9,010Updated 9 months ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆25,614Updated this week
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,743Updated this week
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆11,376Updated this week
- a drop-in replacement for Nmap powered by shodan.io☆3,138Updated 6 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,426Updated 10 months ago
- Fancy reverse and bind shell handler☆2,843Updated last year
- httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.☆9,197Updated this week
- In-depth attack surface mapping and asset discovery☆13,777Updated this week