Linux Persistence Toolkit
β81Sep 27, 2022Updated 3 years ago
Alternatives and similar repositories for linper
Users that are interested in linper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π A small Password Attackβ15Apr 1, 2024Updated 2 years ago
- A Python based Recon Tool to search for Storage Bucketsβ11Jan 21, 2023Updated 3 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find themβ17Feb 1, 2021Updated 5 years ago
- simple code directory bruteβ17Feb 26, 2021Updated 5 years ago
- β12Oct 7, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer β’ AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Swagger Directory Enumeration (SDE)β21Jan 16, 2021Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.β28Dec 29, 2021Updated 4 years ago
- A simple tool to check subdomains for clickjacking attack.β12Mar 30, 2021Updated 5 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.β12Jan 12, 2026Updated 3 months ago
- A collection of tools for managing and automating vulnerability management.β13Mar 24, 2022Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalationβ18Jul 20, 2019Updated 6 years ago
- BAT is a tool to help everyone to securing their web-servers.β10Mar 29, 2021Updated 5 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)β42Dec 2, 2020Updated 5 years ago
- RainbowSQL is very fast dork&SQL injection scanner.β61Jun 12, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- LazyRev for Lazy Peopleβ21Jul 5, 2023Updated 2 years ago
- Lateral Movement via the .NET Profilerβ100Nov 21, 2024Updated last year
- β17Apr 10, 2024Updated 2 years ago
- β13Oct 14, 2017Updated 8 years ago
- UNTESTED Reaver-WPS command-line for Android. Not proven to work with bcm4329 chipset based phones, but should probably do on bcm4330. REβ¦β13May 17, 2014Updated 11 years ago
- β13Feb 25, 2023Updated 3 years ago
- Network Traffic Fuzzerβ17Dec 28, 2024Updated last year
- β20Jan 19, 2021Updated 5 years ago
- The program allows to download large data from shodan quickly, simply and avoid errors.β29Nov 3, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and β¦β27Dec 9, 2024Updated last year
- π Web Application Vulnerability Scanner πβ17May 21, 2022Updated 3 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and lβ¦β542Apr 14, 2021Updated 5 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiterβ28Apr 17, 2022Updated 4 years ago
- This is the official repository for the back end of Mobilinux App.β21Oct 1, 2023Updated 2 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.β17Oct 30, 2021Updated 4 years ago
- Extract parameters/paths from urlsβ17Aug 2, 2020Updated 5 years ago
- Mini Wordress Exploiter using CVE2020β30Dec 25, 2020Updated 5 years ago
- Apuntes Pentesting a ActiveDirectory PentesterAcademyβ22Jun 9, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detectionβ28May 13, 2024Updated last year
- A security tool designed to perform thorough scans on a target using OpenVAS, Zap, and Nexpose. It seamlessly consolidates and integratesβ¦β46Mar 31, 2026Updated 2 weeks ago
- Library of BOFs to interact with SQL serversβ231Dec 3, 2025Updated 4 months ago
- Small project to facilitate creation of .lnk payloadsβ82Nov 18, 2022Updated 3 years ago
- A command based package for simple display of statisticsβ25Dec 2, 2024Updated last year
- Extract the original ransomware binary from an NSIS installerβ18Mar 22, 2017Updated 9 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect thaβ¦β16Mar 10, 2026Updated last month