mostaphabahadou / postenumLinks
A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.
☆289Updated 10 months ago
Alternatives and similar repositories for postenum
Users that are interested in postenum are comparing it to the libraries listed below
Sorting:
- A Linux enumeration script for Hack The Box☆191Updated 6 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆545Updated 4 years ago
- Network Pivoting Toolkit☆458Updated 2 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆573Updated last year
- OSCP cheet sheet☆198Updated 5 years ago
- Custom Tools and Notes from my own Penetration Testing Experience☆281Updated last year
- oscp-ctf is a small collection of basic Bash scripts that make life easier and save time whether you are in the OSCP labs, HackThebox or …☆66Updated 6 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆384Updated 5 years ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆304Updated last year
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆379Updated last year
- Credentials gathering tool automating remote procdump and parse of lsass process.☆777Updated 5 years ago
- Collection of pentesting scripts☆438Updated 3 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆567Updated last year
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆293Updated 6 years ago
- Network reconnaissance and vulnerability assessment tools.☆401Updated 3 years ago
- A Powershell Privilege Escalation Enumeration Script.☆314Updated 7 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated last year
- Custom checklists, cheatsheets, links, and scripts☆127Updated 6 years ago
- Tricks for penetration testing☆581Updated 5 years ago
- Post exploitation helper☆39Updated 2 years ago
- Search gtfobins and lolbas files from your terminal☆462Updated 3 years ago
- Python API wrapper and command-line client for the tools hosted on spyse.com.☆274Updated 5 years ago
- Collection of different exploits☆183Updated 5 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆649Updated 4 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆295Updated last year
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆538Updated 3 years ago
- Bash post exploitation toolkit☆744Updated 2 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆510Updated 7 years ago
- A polyglot payload generator☆242Updated 3 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 4 years ago