liamg / traitorLinks
Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
☆7,019Updated last year
Alternatives and similar repositories for traitor
Users that are interested in traitor are comparing it to the libraries listed below
Sorting:
- A fast, simple, recursive content discovery tool written in Rust.☆7,084Updated 2 weeks ago
- ☆2,506Updated 2 years ago
- Adversary Emulation Framework☆10,126Updated last week
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,274Updated 2 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,785Updated 2 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆18,606Updated this week
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,227Updated last month
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,423Updated 7 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,626Updated 4 months ago
- Gather and update all available and newest CVEs with their PoC.☆7,300Updated this week
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,409Updated 6 months ago
- Monitor linux processes without root permissions☆5,730Updated 2 years ago
- An OOB interaction gathering server and client library☆4,004Updated last week
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,459Updated this week
- Connect like there is no firewall. Securely.☆1,757Updated last month
- Fast web fuzzer written in Go☆14,968Updated 6 months ago
- An HTTP toolkit for security research.☆8,843Updated 8 months ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for att…☆5,490Updated this week
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,349Updated this week
- a drop-in replacement for Nmap powered by shodan.io☆3,122Updated 5 months ago
- Real-time HTTP Intrusion Detection☆3,071Updated last year
- Windows Exploit Suggester - Next Generation☆4,658Updated this week
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,712Updated 2 weeks ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,898Updated 3 years ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,887Updated last year
- Fancy reverse and bind shell handler☆2,827Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,465Updated 3 years ago
- In-depth attack surface mapping and asset discovery☆13,671Updated last month
- httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.☆9,110Updated this week
- A Workflow Engine for Offensive Security☆5,925Updated 2 months ago