Automated SUID Privilege Escalation Checker
☆19Oct 15, 2023Updated 2 years ago
Alternatives and similar repositories for SUIDump
Users that are interested in SUIDump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Sep 29, 2022Updated 3 years ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆11Aug 15, 2024Updated last year
- 用于练习xhr逆向的靶场☆25Jul 27, 2025Updated 8 months ago
- ☆14Sep 8, 2024Updated last year
- CVE-2022-0185 exploit rewritten with pipe primitive☆17Apr 5, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A tiny fast reverse proxy.☆12Dec 7, 2023Updated 2 years ago
- PEN-300 collection to help you on your exam.☆13Apr 19, 2022Updated 4 years ago
- A 2 part modified version of the Mobile Mouse 3.6.0.4 exploit.☆14Aug 7, 2023Updated 2 years ago
- 💀 Linux local root exploit for CVE-2018-18955☆23Jan 20, 2022Updated 4 years ago
- This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft☆25May 5, 2022Updated 3 years ago
- ☆11Updated this week
- A fully featured backdoor that uses Gmail as a C&C server☆19Oct 13, 2015Updated 10 years ago
- Exercism exercises in AWK.☆20Apr 2, 2026Updated 2 weeks ago
- Windows Etw LPE☆51Oct 12, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Create SSH-like TCP tunnels over a hole-punched QUIC connection☆26Apr 12, 2024Updated 2 years ago
- glibc getcwd() local privilege escalation compiled binaries☆32Feb 9, 2018Updated 8 years ago
- Python tool to interact with WMI StdRegProv☆60Nov 19, 2024Updated last year
- 2 PE Loader tools that load a PE from memory, decrypt it and make some magic things to execute seamlessly from memory☆54Nov 7, 2025Updated 5 months ago
- Telegram Message Sender☆23Oct 14, 2025Updated 6 months ago
- ☆27Jul 30, 2021Updated 4 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- Refreshes/reloads the environment variables in the current PowerShell session☆20Apr 8, 2026Updated last week
- Dutch Government Bugbounty scope, subdomains and endpoints☆34Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Test whether a container environment is vulnerable to container escapes via CVE-2022-0492☆48Mar 9, 2022Updated 4 years ago
- book notes for "Effective C" by Robert C. Seacord☆12Feb 4, 2024Updated 2 years ago
- Extract all users from an Active Directory domain to an Excel worksheet.☆38Jan 31, 2025Updated last year
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Nov 22, 2024Updated last year
- Rusty Mimikatz - All credits to: github.com/ThottySploity/mimiRust (Original author deleted account so I uploaded for community use)☆21Nov 24, 2022Updated 3 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- Dynamically deploy containers for CTF challenges.☆23Nov 29, 2025Updated 4 months ago
- Expose HTTP/SSH/TCP services through SSH port forwarding.☆66Apr 9, 2026Updated last week
- C++ Reflective Assembly Loader☆32Mar 7, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An interactive webshell and HTTP tunnel for TCP connections using chunked transfer encoding☆53Sep 20, 2018Updated 7 years ago
- IDA plugin to Display Mach-O headers☆21Nov 4, 2011Updated 14 years ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆465Aug 17, 2024Updated last year
- 「🐞」Bug Bounty Tricks☆40Oct 4, 2023Updated 2 years ago
- Grep subdomains from web pages.☆42Feb 10, 2025Updated last year
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 10 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Jan 24, 2024Updated 2 years ago