oschoudhury / linuxprivcheckerLinks
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
☆18Updated 6 years ago
Alternatives and similar repositories for linuxprivchecker
Users that are interested in linuxprivchecker are comparing it to the libraries listed below
Sorting:
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- ☆122Updated 7 years ago
- My OSCP report template in LaTex☆25Updated 5 years ago
- A Metasploit auto auxiliary script☆104Updated 2 years ago
- Red Team Resources☆60Updated 6 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 6 years ago
- Pypykatz server☆125Updated 6 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆162Updated 5 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 9 years ago
- Extensible Red Team Framework☆111Updated 5 years ago
- ☆61Updated 7 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Updated 8 years ago
- Miscellaneous pentesting scripts for OSCP☆59Updated 6 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- Linux setup tool for Kali Linux☆79Updated 6 years ago
- A collection of my Dockerfiles☆90Updated 2 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆55Updated 8 months ago
- Discover target social media profiles☆81Updated 2 years ago
- Terribad PrivEsc enumeration script for Windows systems☆14Updated 4 years ago
- ☆22Updated 8 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- Hacking challenges☆31Updated 7 years ago
- cve-2018-10933 libssh authentication bypass☆108Updated 6 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Updated 8 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 11 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- Cowrie Honeypot Obscurer☆17Updated 4 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago