liamg / traitorLinks
Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
β7,104Updated last year
Alternatives and similar repositories for traitor
Users that are interested in traitor are comparing it to the libraries listed below
Sorting:
- Gather and update all available and newest CVEs with their PoC.β7,525Updated last week
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,395Updated last month
- Fast web fuzzer written in Goβ15,527Updated 9 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.β5,497Updated 9 months ago
- a drop-in replacement for Nmap powered by shodan.ioβ3,173Updated 9 months ago
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.β12,615Updated this week
- An OOB interaction gathering server and client libraryβ4,165Updated last week
- π‘ PoC auto collect from GitHub. β οΈ Be careful Malware.β7,517Updated this week
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rulesβ¦β5,951Updated last year
- Adversary Emulation Frameworkβ10,635Updated this week
- An HTTP toolkit for security research.β9,278Updated last year
- π¦ Make security testing of K8s, Docker, and Containerd easier.β4,560Updated 3 months ago
- Monitor linux processes without root permissionsβ5,865Updated 3 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)β19,215Updated last week
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β7,159Updated this week
- A fast, simple, recursive content discovery tool written in Rust.β7,482Updated this week
- Fast passive subdomain enumeration tool.β12,991Updated this week
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attβ¦β5,740Updated this week
- Linux privilege escalation auditing toolβ6,375Updated last year
- Quickly discover exposed hosts on the internet using multiple search engines.β2,816Updated last month
- β2,511Updated 3 years ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.β3,230Updated 5 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,475Updated 3 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,344Updated last year
- Windows Exploit Suggester - Next Generationβ4,754Updated this week
- Connect like there is no firewall. Securely.β1,804Updated 2 months ago
- A versatile and portable proxy for capturing, manipulating, and replaying HTTP/HTTPS traffic on the go.β2,977Updated last month
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifiβ¦β2,425Updated 4 months ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Eβ¦β8,455Updated 2 months ago
- A Modern Orchestration Engine for Securityβ6,070Updated this week