pentestmonkey / unix-privesc-check
Automatically exported from code.google.com/p/unix-privesc-check
☆1,057Updated 4 years ago
Alternatives and similar repositories for unix-privesc-check:
Users that are interested in unix-privesc-check are comparing it to the libraries listed below
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,505Updated last year
- Linux Exploit Suggester; based on operating system release number☆1,786Updated 10 years ago
- Post Exploitation Collection☆1,562Updated 4 years ago
- ☆1,145Updated 8 years ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆839Updated 2 months ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆976Updated 7 years ago
- Python PTY backdoors - full PTY or nothing!☆743Updated 10 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆561Updated 11 months ago
- SMBMap is a handy SMB enumeration tool☆1,890Updated last month
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,645Updated 3 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,588Updated 4 years ago
- offsec batteries included☆1,553Updated last year
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆1,934Updated 6 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,862Updated 4 years ago
- JAWS - Just Another Windows (Enum) Script☆1,765Updated 4 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,008Updated 6 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,523Updated 6 months ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆632Updated 6 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,053Updated last year
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆575Updated 10 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆887Updated 4 years ago
- ☆1,432Updated 2 years ago
- Post Exploitation Wiki☆518Updated 5 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,423Updated 2 years ago
- pwning IPv4 via IPv6☆1,777Updated last year
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010☆1,240Updated last year
- ODAT: Oracle Database Attacking Tool☆1,663Updated 8 months ago
- MS17-010☆2,182Updated last year
- Pop shells like a master.☆1,457Updated 6 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆810Updated 2 years ago