luke-goddard / enumy
Linux post exploitation privilege escalation enumeration
☆256Updated 4 years ago
Alternatives and similar repositories for enumy:
Users that are interested in enumy are comparing it to the libraries listed below
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- Search Exploitable Software on Linux☆227Updated 2 years ago
- Simple python script to extract unsafe functions from php projects☆199Updated 7 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆373Updated 3 years ago
- Linux privilege escalation via LXD☆133Updated 5 years ago
- Python automation of Docker.sock abuse☆212Updated 2 years ago
- Various local exploits☆140Updated 2 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆595Updated 4 years ago
- SonicWall SSL-VPN Exploit☆175Updated 4 years ago
- an asynchronous target enumeration tool☆243Updated 2 years ago
- DNS Rebinding Exploitation Framework☆488Updated 3 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆694Updated 4 years ago
- Reverse Shell Cheat Sheet TooL☆294Updated 4 years ago
- Search gtfobins and lolbas files from your terminal☆459Updated 2 years ago
- Web-based reverse shell generator☆173Updated 3 years ago
- Multiplatform reverse shell generator☆586Updated 5 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆430Updated 2 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆380Updated 4 years ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆155Updated 4 years ago
- Linux Privilege Escalation Tool☆184Updated 6 years ago
- ☆333Updated 2 years ago
- Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)☆363Updated 5 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi …☆351Updated last month
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆201Updated last year
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆249Updated 2 years ago
- Everything you need about Burp Extension Generation☆152Updated 2 years ago
- Web-based check for Windows privesc vulnerabilities☆139Updated last year
- HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Se…☆278Updated 3 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 4 years ago
- Search an exploit in the local exploitdb database by its CVE☆171Updated 2 years ago