liamg / traitorLinks
Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
☆6,940Updated last year
Alternatives and similar repositories for traitor
Users that are interested in traitor are comparing it to the libraries listed below
Sorting:
- Gather and update all available and newest CVEs with their PoC.☆7,078Updated last week
- A fast, simple, recursive content discovery tool written in Rust.☆6,752Updated 3 months ago
- Fast web fuzzer written in Go☆14,253Updated 2 months ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,145Updated last month
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,069Updated this week
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,266Updated 4 months ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆5,948Updated 2 months ago
- ☆2,509Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆6,434Updated last month
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,024Updated 4 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,166Updated 6 months ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for att…☆5,305Updated last week
- An OOB interaction gathering server and client library☆3,844Updated this week
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,780Updated 2 years ago
- Adversary Emulation Framework☆9,647Updated 2 weeks ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,301Updated 2 months ago
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.☆2,410Updated 11 months ago
- Connect like there is no firewall. Securely.☆1,706Updated last week
- Fast passive subdomain enumeration tool.☆11,952Updated 2 weeks ago
- An HTTP toolkit for security research.☆7,033Updated 5 months ago
- Scanning APK file for URIs, endpoints & secrets.☆5,359Updated 3 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,451Updated 2 years ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆11,818Updated 8 months ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,637Updated 3 weeks ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,248Updated 9 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,873Updated 2 years ago
- Monitor linux processes without root permissions☆5,539Updated 2 years ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,158Updated 5 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,020Updated this week
- Windows Exploit Suggester - Next Generation☆4,518Updated last week