luke-goddard / enumy
Linux post exploitation privilege escalation enumeration
☆256Updated 4 years ago
Alternatives and similar repositories for enumy:
Users that are interested in enumy are comparing it to the libraries listed below
- Simple python script to extract unsafe functions from php projects☆197Updated 6 years ago
- Python automation of Docker.sock abuse☆211Updated 2 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- Search Exploitable Software on Linux☆226Updated last year
- Reverse Shell Cheat Sheet TooL☆293Updated 4 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆533Updated 2 years ago
- Linux Privilege Escalation Tool☆184Updated 5 years ago
- Lesser Known Web Attack Lab☆330Updated 5 years ago
- Search gtfobins and lolbas files from your terminal☆458Updated 2 years ago
- Web-based check for Windows privesc vulnerabilities☆139Updated last year
- an asynchronous target enumeration tool☆243Updated 2 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆692Updated 4 years ago
- Web-based reverse shell generator☆173Updated 3 years ago
- Smart Install Exploitation Tool☆575Updated 3 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆371Updated 3 years ago
- SonicWall SSL-VPN Exploit☆174Updated 4 years ago
- Windows Pentest Scripts☆229Updated 7 years ago
- ☆332Updated 2 years ago
- Linux post exploitation enumeration and exploit checking tools☆179Updated 4 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆208Updated 2 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆256Updated 4 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆572Updated 8 months ago
- An XSS reverse shell framework☆306Updated 6 years ago
- Some of my exploits.☆575Updated 4 years ago
- DNS Rebinding Exploitation Framework☆488Updated 3 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆709Updated 5 years ago
- HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Se…☆279Updated 3 years ago
- Network Pivoting Toolkit☆440Updated last year
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 3 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆378Updated 4 years ago