lil-skelly / wget-rootLinks
This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.
☆40Updated last year
Alternatives and similar repositories for wget-root
Users that are interested in wget-root are comparing it to the libraries listed below
Sorting:
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆18Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated 2 years ago
- ☆25Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆38Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- MacroExploit use in excel sheet☆20Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- ☆14Updated 3 months ago
- Enumeration & fingerprint tool☆24Updated last year
- A Red Teaming tool focused on profiling the target.☆26Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆13Updated 2 years ago
- ☆43Updated last month
- ☆16Updated last week
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆28Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 2 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆17Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 3 years ago
- Red Team Server (RTS)☆16Updated last year
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago