liamg / traitorLinks
Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
β6,968Updated last year
Alternatives and similar repositories for traitor
Users that are interested in traitor are comparing it to the libraries listed below
Sorting:
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,169Updated 2 months ago
- Gather and update all available and newest CVEs with their PoC.β7,124Updated this week
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web applicationβ4,824Updated 7 months ago
- Adversary Emulation Frameworkβ9,754Updated 2 weeks ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systemsβ11,915Updated 9 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.β5,324Updated 3 months ago
- Connect like there is no firewall. Securely.β1,718Updated last month
- Fast passive subdomain enumeration tool.β12,058Updated 2 weeks ago
- In-depth attack surface mapping and asset discoveryβ13,361Updated this week
- β2,511Updated 2 years ago
- Monitor linux processes without root permissionsβ5,581Updated 2 years ago
- Fast web fuzzer written in Goβ14,403Updated 3 months ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attβ¦β5,348Updated last week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)β18,044Updated this week
- Linux privilege escalation auditing toolβ6,087Updated last year
- A collection of all the data i could extract from 1 billion leaked credentials from internet.β3,169Updated 5 years ago
- a drop-in replacement for Nmap powered by shodan.ioβ3,079Updated 3 months ago
- π‘ PoC auto collect from GitHub. β οΈ Be careful Malware.β7,147Updated this week
- A pretty sweet vulnerability scannerβ4,140Updated 10 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifiβ¦β2,342Updated last week
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and β¦β1,876Updated 2 years ago
- Windows Exploit Suggester - Next Generationβ4,560Updated this week
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Eβ¦β8,072Updated 5 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,268Updated 10 months ago
- π¦ Make security testing of K8s, Docker, and Containerd easier.β4,310Updated 4 months ago
- An OOB interaction gathering server and client libraryβ3,873Updated this week
- A toolkit for testing, tweaking and cracking JSON Web Tokensβ5,993Updated 3 months ago
- The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, suβ¦β3,529Updated this week
- HTTP parameter discovery suite.β5,783Updated 5 months ago
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.β2,426Updated last year