A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.
☆292Jan 5, 2026Updated 4 months ago
Alternatives and similar repositories for postenum
Users that are interested in postenum are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆250Jun 19, 2024Updated last year
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆248Sep 9, 2021Updated 4 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆543Apr 14, 2021Updated 5 years ago
- Linux post exploitation privilege escalation enumeration☆256Aug 20, 2020Updated 5 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆534Mar 27, 2022Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆214Jun 23, 2020Updated 5 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- an asynchronous target enumeration tool☆250Dec 8, 2022Updated 3 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆300Oct 2, 2019Updated 6 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 10 months ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- HashCobra Hash Cracking tool.☆123Dec 1, 2020Updated 5 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆825May 1, 2026Updated 2 weeks ago
- An asynchronous enumeration & vulnerability scanner. Run all the tools on all the hosts.☆400Mar 24, 2021Updated 5 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,128Dec 7, 2022Updated 3 years ago
- For all your network pentesting needs☆153Jun 26, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 7 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆523Nov 26, 2022Updated 3 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,417Oct 3, 2020Updated 5 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,908May 3, 2026Updated 2 weeks ago
- Red Team Tool Kit☆1,132Dec 8, 2022Updated 3 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,774Dec 9, 2025Updated 5 months ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆508Sep 23, 2025Updated 7 months ago
- Windows Exploit Suggester - Next Generation☆4,845May 8, 2026Updated last week
- The Shadow Attack Framework☆1,118Sep 4, 2022Updated 3 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆37Feb 11, 2020Updated 6 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆1,871Aug 12, 2021Updated 4 years ago