luke-goddard / enumy
Linux post exploitation privilege escalation enumeration
☆256Updated 4 years ago
Alternatives and similar repositories for enumy:
Users that are interested in enumy are comparing it to the libraries listed below
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- Search Exploitable Software on Linux☆227Updated 2 years ago
- Python automation of Docker.sock abuse☆212Updated 2 years ago
- Simple python script to extract unsafe functions from php projects☆199Updated 7 years ago
- Reverse Shell Cheat Sheet TooL☆295Updated 4 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆433Updated 2 years ago
- Lesser Known Web Attack Lab☆331Updated 5 years ago
- Everything you need about Burp Extension Generation☆153Updated 2 years ago
- an asynchronous target enumeration tool☆244Updated 2 years ago
- Linux privilege escalation via LXD☆133Updated 5 years ago
- DNS Rebinding Exploitation Framework☆488Updated 4 years ago
- Various local exploits☆141Updated 3 years ago
- An SNMPv3 User Enumerator and Attack tool☆254Updated 4 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆537Updated 3 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆202Updated last year
- This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit c…☆573Updated 5 years ago
- Linux Privilege Escalation Tool☆184Updated 6 years ago
- Collection of different exploits☆182Updated 4 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆375Updated 3 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆613Updated 3 months ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆251Updated 2 years ago
- ☆334Updated 2 years ago
- An XSS reverse shell framework☆307Updated 6 years ago
- Public work for CVE-2019-0708☆292Updated 5 years ago
- Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)☆363Updated 5 years ago
- Web-based reverse shell generator☆173Updated 4 years ago
- Some of my exploits.☆580Updated 4 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆575Updated 10 months ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆380Updated 4 years ago
- Network Pivoting Toolkit☆444Updated last year