mostaphabahadou / postenum
A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.
☆282Updated last month
Alternatives and similar repositories for postenum:
Users that are interested in postenum are comparing it to the libraries listed below
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆759Updated 4 years ago
- Network Pivoting Toolkit☆442Updated last year
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆543Updated 3 years ago
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆374Updated 4 months ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆573Updated 9 months ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Updated 3 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆379Updated 4 years ago
- A Linux enumeration script for Hack The Box☆187Updated 5 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆694Updated 4 years ago
- Bash post exploitation toolkit☆728Updated last year
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆560Updated 11 months ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆507Updated 6 years ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆301Updated 9 months ago
- OSCP cheet sheet☆196Updated 4 years ago
- an asynchronous target enumeration tool☆243Updated 2 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆793Updated 3 months ago
- Search gtfobins and lolbas files from your terminal☆458Updated 2 years ago
- A polyglot payload generator☆240Updated 2 years ago
- Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribut…☆532Updated 3 years ago
- Custom checklists, cheatsheets, links, and scripts☆125Updated 5 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆478Updated 4 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- Custom Tools and Notes from my own Penetration Testing Experience☆276Updated last year
- gather gather gather☆573Updated 2 weeks ago
- Tricks for penetration testing☆574Updated 4 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆386Updated 6 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Updated 3 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆631Updated 6 years ago