liamg / traitorLinks
Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
☆7,083Updated last year
Alternatives and similar repositories for traitor
Users that are interested in traitor are comparing it to the libraries listed below
Sorting:
- Adversary Emulation Framework☆10,436Updated this week
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,459Updated 8 months ago
- Monitor linux processes without root permissions☆5,813Updated 2 years ago
- Fast web fuzzer written in Go☆15,349Updated 8 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,012Updated this week
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,733Updated 6 months ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,442Updated 3 months ago
- Fancy reverse and bind shell handler☆2,860Updated last year
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,785Updated 2 years ago
- Connect like there is no firewall. Securely.☆1,788Updated last month
- A fast, simple, recursive content discovery tool written in Rust.☆7,349Updated last week
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,907Updated 3 years ago
- The ultimate WinRM shell for hacking/pentesting☆5,178Updated 2 weeks ago
- Gather and update all available and newest CVEs with their PoC.☆7,471Updated this week
- The all-in-one browser extension for offensive security professionals 🛠☆6,471Updated 11 months ago
- Windows Exploit Suggester - Next Generation☆4,726Updated last week
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,346Updated last week
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,516Updated last month
- Linux privilege escalation auditing tool☆6,333Updated last year
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,412Updated 2 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,383Updated 11 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,472Updated 3 years ago
- A swiss army knife for pentesting networks☆9,010Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,269Updated last week
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules …☆5,925Updated last year
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,971Updated 3 weeks ago
- The Havoc Framework☆8,032Updated 2 weeks ago
- 🔪 Leak git repositories from misconfigured websites☆1,588Updated 3 weeks ago
- An OOB interaction gathering server and client library☆4,102Updated this week
- ☆2,510Updated 3 years ago