nilotpalbiswas / Auto-Root-Exploit
Auto Root Exploit Tool
☆531Updated last year
Alternatives and similar repositories for Auto-Root-Exploit
Users that are interested in Auto-Root-Exploit are comparing it to the libraries listed below
Sorting:
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆493Updated 3 years ago
- My collection of metasploit auxiliary post-modules☆191Updated 5 years ago
- metasploitHelper☆248Updated 5 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆286Updated 6 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆492Updated 3 years ago
- Micro$oft Windows Hacking Pack☆521Updated 7 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆332Updated 9 months ago
- Script used to generate and encode a PowerShell based Metasploit payloads.☆275Updated 3 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆727Updated 7 years ago
- Script to steal passwords from ssh.☆480Updated 6 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike 2.x. Cortana Scripts are not compatible with Cobalt Stri…☆452Updated 4 years ago
- DNS-Shell is an interactive Shell over DNS channel☆525Updated 4 years ago
- Search Exploitable Software on Linux☆227Updated 2 years ago
- transform your payload.exe into one fake word doc (.ppt)☆468Updated 5 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆317Updated 6 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆727Updated 2 years ago
- Inline file transfer using in-built Windows tools (DEBUG.exe or PowerShell).☆314Updated 5 years ago
- just for fun ¯\_(ツ)_/¯☆270Updated 8 years ago
- for mass exploiting☆603Updated 2 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆342Updated 4 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆166Updated 5 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆290Updated 7 years ago
- Fud Payload generator script☆242Updated 6 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆535Updated 4 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 7 years ago
- An exploit for Apache Struts CVE-2018-11776☆301Updated 6 years ago
- ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )☆236Updated 4 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆381Updated 2 years ago
- tools☆542Updated 6 years ago
- Reverse Shell Cheat Sheet TooL☆296Updated 5 years ago