luke-goddard / enumyLinks
Linux post exploitation privilege escalation enumeration
☆259Updated 5 years ago
Alternatives and similar repositories for enumy
Users that are interested in enumy are comparing it to the libraries listed below
Sorting:
- Simple python script to extract unsafe functions from php projects☆196Updated 7 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆297Updated 6 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆385Updated 5 years ago
- Various local exploits☆148Updated 3 years ago
- Python automation of Docker.sock abuse☆211Updated 3 years ago
- Search Exploitable Software on Linux☆234Updated 2 years ago
- Web-based reverse shell generator☆172Updated 4 years ago
- Search an exploit in the local exploitdb database by its CVE☆171Updated 3 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆538Updated 3 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆248Updated 4 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆542Updated 4 years ago
- Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]☆371Updated 6 years ago
- Lesser Known Web Attack Lab☆330Updated 6 years ago
- Search gtfobins and lolbas files from your terminal☆462Updated 3 years ago
- HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Se…☆280Updated 4 years ago
- Linux Privilege Escalation Tool☆186Updated 6 years ago
- Reverse Shell Cheat Sheet TooL☆300Updated 5 years ago
- Pip install exploit package☆157Updated 7 years ago
- Network Pivoting Toolkit☆456Updated 2 years ago
- A Linux enumeration script for Hack The Box☆191Updated 6 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆255Updated 3 years ago
- an asynchronous target enumeration tool☆245Updated 3 years ago
- Linux privilege escalation via LXD☆141Updated 5 years ago
- ☆334Updated 3 years ago
- Python script wrote to automate the process of generating various reverse shells.☆200Updated last month
- Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server …☆104Updated 5 years ago
- A denial-of-service proof-of-concept for CVE-2020-1350☆237Updated 5 years ago
- Everything you need about Burp Extension Generation☆157Updated 3 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆704Updated 5 years ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆159Updated 5 years ago