mostaphabahadou / postenum
A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.
☆284Updated 3 months ago
Alternatives and similar repositories for postenum
Users that are interested in postenum are comparing it to the libraries listed below
Sorting:
- Credentials gathering tool automating remote procdump and parse of lsass process.☆766Updated 4 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 4 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆575Updated 10 months ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆537Updated 3 years ago
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆377Updated 5 months ago
- Network Pivoting Toolkit☆445Updated last year
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated 10 months ago
- A Linux enumeration script for Hack The Box☆189Updated 5 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆380Updated 4 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- A polyglot payload generator☆241Updated 2 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆561Updated last year
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆304Updated 11 months ago
- OSCP cheet sheet☆197Updated 4 years ago
- an asynchronous target enumeration tool☆244Updated 2 years ago
- This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit c…☆573Updated 5 years ago
- A framework for stealthy domain reconnaissance☆303Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆482Updated 10 months ago
- Custom checklists, cheatsheets, links, and scripts☆125Updated 5 years ago
- Network reconnaissance and vulnerability assessment tools.☆399Updated 3 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆478Updated 4 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆509Updated 7 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆631Updated 3 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆290Updated 6 months ago
- Tricks for penetration testing☆578Updated 4 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆806Updated last month
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆694Updated 4 years ago
- Post Exploitation Wiki☆520Updated 5 years ago