linted / linuxprivcheckerLinks
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
☆539Updated 3 years ago
Alternatives and similar repositories for linuxprivchecker
Users that are interested in linuxprivchecker are comparing it to the libraries listed below
Sorting:
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,335Updated last month
- JAWS - Just Another Windows (Enum) Script☆1,783Updated 4 years ago
- ☆1,110Updated 4 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,285Updated last month
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,662Updated 3 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,925Updated 9 months ago
- Compiled Binaries for Ghostpack☆1,385Updated 7 months ago
- Windows / Linux Local Privilege Escalation Workshop☆1,957Updated 2 years ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,175Updated 2 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,610Updated last year
- Modified template for the OSCP Exam and Labs. Used during my passing attempt☆945Updated 4 years ago
- Username tools for penetration testing☆1,049Updated 8 months ago
- Collection of reverse shells for red team operations.☆497Updated 2 months ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆624Updated 3 years ago
- Penelope Shell Handler☆940Updated 2 months ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010☆1,255Updated last year
- Red Teaming & Pentesting checklists for various engagements☆2,541Updated 9 months ago
- A Python based ingestor for BloodHound☆2,140Updated 2 months ago
- ☆211Updated 4 years ago
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆751Updated 4 years ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆289Updated 3 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,603Updated 4 years ago
- Windows Local Privilege Escalation from Service Account to System☆808Updated 5 years ago
- Wordlists for creating statistically likely username lists for use in password attacks and security testing☆1,085Updated 2 years ago
- Abusing impersonation privileges through the "Printer Bug"☆2,006Updated 4 years ago
- WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used ag…☆1,544Updated 11 months ago
- My own OSCP guide☆826Updated 2 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,150Updated last year
- WhiteWinterWolf's PHP web shell☆665Updated 7 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆700Updated 9 months ago