liamg / traitorLinks
Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
☆7,083Updated last year
Alternatives and similar repositories for traitor
Users that are interested in traitor are comparing it to the libraries listed below
Sorting:
- Gather and update all available and newest CVEs with their PoC.☆7,471Updated this week
- Adversary Emulation Framework☆10,436Updated this week
- A fast, simple, recursive content discovery tool written in Rust.☆7,368Updated last week
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,460Updated this week
- a drop-in replacement for Nmap powered by shodan.io☆3,149Updated 8 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,785Updated 2 years ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,375Updated last month
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,463Updated 8 months ago
- ☆2,510Updated 3 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,012Updated last week
- Monitor linux processes without root permissions☆5,823Updated 2 years ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,925Updated last year
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for att…☆5,610Updated last week
- Windows Exploit Suggester - Next Generation☆4,726Updated last week
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,516Updated last month
- An OOB interaction gathering server and client library☆4,102Updated last week
- 🤖 The Modern Port Scanner 🤖☆18,901Updated last week
- Connect like there is no firewall. Securely.☆1,793Updated last month
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,298Updated 8 months ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,439Updated 3 years ago
- Fancy reverse and bind shell handler☆2,860Updated last year
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,907Updated 3 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,733Updated 6 months ago
- A Workflow Engine for Offensive Security☆6,009Updated 4 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,472Updated 3 years ago
- Fast web fuzzer written in Go☆15,349Updated 8 months ago
- Fast passive subdomain enumeration tool.☆12,759Updated 2 weeks ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,022Updated last week
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,461Updated 3 months ago
- An HTTP toolkit for security research.☆9,048Updated 10 months ago