Automated SUID Privilege Escalation Checker
☆19Oct 15, 2023Updated 2 years ago
Alternatives and similar repositories for SUIDump
Users that are interested in SUIDump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆14Sep 29, 2022Updated 3 years ago
- 用于练习xhr逆向的靶场☆25Jul 27, 2025Updated 9 months ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆11Aug 15, 2024Updated last year
- ☆14Sep 8, 2024Updated last year
- CVE-2022-25636 exploit rewritten with pipe primitive☆19Apr 5, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Network Execution Tool☆17Sep 23, 2024Updated last year
- CVE-2022-0185 exploit rewritten with pipe primitive☆16Apr 5, 2022Updated 4 years ago
- A tiny fast reverse proxy.☆12Dec 7, 2023Updated 2 years ago
- PEN-300 collection to help you on your exam.☆13Apr 19, 2022Updated 4 years ago
- Unlimited license, owned WinRAR☆17Nov 27, 2021Updated 4 years ago
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆19Aug 9, 2022Updated 3 years ago
- A 2 part modified version of the Mobile Mouse 3.6.0.4 exploit.☆13Aug 7, 2023Updated 2 years ago
- 💀 Linux local root exploit for CVE-2018-18955☆23Jan 20, 2022Updated 4 years ago
- A Python script to backup all repos (public or private) of a user.☆23Oct 2, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆21Feb 6, 2024Updated 2 years ago
- ☆22Dec 1, 2021Updated 4 years ago
- ☆11May 12, 2026Updated last week
- A fully featured backdoor that uses Gmail as a C&C server☆19Oct 13, 2015Updated 10 years ago
- Create SSH-like TCP tunnels over a hole-punched QUIC connection☆26Apr 12, 2024Updated 2 years ago
- Tooling for discovery & information gathering from OPC-UA servers☆27Jul 2, 2025Updated 10 months ago
- A python-based SSH API for MikroTik devices☆16Jun 9, 2021Updated 4 years ago
- Proof of concept code for CVE-2023-2008☆40Jun 12, 2023Updated 2 years ago
- 2 PE Loader tools that load a PE from memory, decrypt it and make some magic things to execute seamlessly from memory☆54Apr 16, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Telegram Message Sender☆23Oct 14, 2025Updated 7 months ago
- ☆27Jul 30, 2021Updated 4 years ago
- 解决使用默认密码webshell的问题☆26Jan 20, 2022Updated 4 years ago
- This tool decode Android's pattern lock screen with gesture.key file in Android device.☆17Feb 27, 2015Updated 11 years ago
- Dutch Government Bugbounty scope, subdomains and endpoints☆36Updated this week
- CVE-2021-22555 exploit rewritten with pipe primitive☆39May 18, 2022Updated 4 years ago
- Test whether a container environment is vulnerable to container escapes via CVE-2022-0492☆47Mar 9, 2022Updated 4 years ago
- book notes for "Effective C" by Robert C. Seacord☆12Feb 4, 2024Updated 2 years ago
- Extract all users from an Active Directory domain to an Excel worksheet.☆38Jan 31, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Nov 22, 2024Updated last year
- Rusty Mimikatz - All credits to: github.com/ThottySploity/mimiRust (Original author deleted account so I uploaded for community use)☆21Nov 24, 2022Updated 3 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- Dynamically deploy containers for CTF challenges.☆23Nov 29, 2025Updated 5 months ago
- Scripts permettant de contourner la protection antivirale de Windows Defender via la technique de Direct Syscalls avec une injection de s…☆31Oct 14, 2022Updated 3 years ago
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆30May 1, 2026Updated 2 weeks ago
- An interactive webshell and HTTP tunnel for TCP connections using chunked transfer encoding☆55Sep 20, 2018Updated 7 years ago