oschoudhury / linuxprivcheckerLinks
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
☆18Updated 6 years ago
Alternatives and similar repositories for linuxprivchecker
Users that are interested in linuxprivchecker are comparing it to the libraries listed below
Sorting:
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- ☆122Updated 7 years ago
- My OSCP report template in LaTex☆25Updated 5 years ago
- Red Team Resources☆60Updated 6 years ago
- A Metasploit auto auxiliary script☆103Updated 3 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆97Updated 8 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 9 years ago
- Extensible Red Team Framework☆112Updated 5 years ago
- Pypykatz server☆125Updated 6 years ago
- ☆61Updated 7 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆164Updated 6 years ago
- Miscellaneous pentesting scripts for OSCP☆59Updated 6 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆55Updated last year
- CTF website frontend for SecGen☆21Updated 8 years ago
- ☆22Updated 8 years ago
- Small CTF challenges running on Docker☆158Updated 7 years ago
- Terribad PrivEsc enumeration script for Windows systems☆15Updated 5 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Updated 8 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 5 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 7 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 9 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Updated 9 years ago
- Basics of Windows privilege escalation☆134Updated 8 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- Th3Reverser is a python tool designed to generate reverse shell scripts and commands and exploit them using nclib module for python.☆21Updated 6 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 12 years ago
- Collection of things made during my preparation to take on OSCE☆189Updated 3 years ago