Automated SUID Privilege Escalation Checker
☆19Oct 15, 2023Updated 2 years ago
Alternatives and similar repositories for SUIDump
Users that are interested in SUIDump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 用于练习xhr逆向的靶场☆20Jul 27, 2025Updated 8 months ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆11Aug 15, 2024Updated last year
- CVE-2022-25636 exploit rewritten with pipe primitive☆20Apr 5, 2022Updated 3 years ago
- Network Execution Tool☆17Sep 23, 2024Updated last year
- A tiny fast reverse proxy.☆13Dec 7, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- PEN-300 collection to help you on your exam.☆13Apr 19, 2022Updated 3 years ago
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago
- A Python script to backup all repos (public or private) of a user.☆22Oct 2, 2023Updated 2 years ago
- ☆21Dec 1, 2021Updated 4 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆24May 6, 2025Updated 10 months ago
- Windows Etw LPE☆51Oct 12, 2021Updated 4 years ago
- Create SSH-like TCP tunnels over a hole-punched QUIC connection☆26Apr 12, 2024Updated last year
- A python-based SSH API for MikroTik devices☆16Jun 9, 2021Updated 4 years ago
- Python tool to interact with WMI StdRegProv☆60Nov 19, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- 2 PE Loader tools that load a PE from memory, decrypt it and make some magic things to execute seamlessly from memory☆53Nov 7, 2025Updated 4 months ago
- Telegram Message Sender☆23Oct 14, 2025Updated 5 months ago
- ☆27Jul 30, 2021Updated 4 years ago
- 解决使用默认密码webshell的问题☆26Jan 20, 2022Updated 4 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- This tool decode Android's pattern lock screen with gesture.key file in Android device.☆17Feb 27, 2015Updated 11 years ago
- CVE-2021-22555 exploit rewritten with pipe primitive☆37May 18, 2022Updated 3 years ago
- Dutch Government Bugbounty scope, subdomains and endpoints☆33Updated this week
- Port forwarding via MSRPC (445/tcp) [WIP]☆34Aug 26, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Nov 22, 2024Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- Dynamically deploy containers for CTF challenges.☆22Nov 29, 2025Updated 3 months ago
- Expose HTTP/SSH/TCP services through SSH port forwarding.☆66Updated this week
- C++ Reflective Assembly Loader☆31Mar 7, 2025Updated last year
- A web shell for pivoting and lateral movement☆33Nov 29, 2017Updated 8 years ago
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆29Aug 18, 2025Updated 7 months ago
- ICSGoat: A Damn Vulnerable ICS Infrastructure☆32Aug 26, 2024Updated last year
- An interactive webshell and HTTP tunnel for TCP connections using chunked transfer encoding☆52Sep 20, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- IDA plugin to Display Mach-O headers☆21Nov 4, 2011Updated 14 years ago
- 「🐞」Bug Bounty Tricks☆41Oct 4, 2023Updated 2 years ago
- Grep subdomains from web pages.☆42Feb 10, 2025Updated last year
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 10 months ago
- burp插件开发笔记☆11Dec 26, 2021Updated 4 years ago
- ECMAScript AST query library.☆12Jul 7, 2020Updated 5 years ago
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆38Feb 11, 2026Updated last month