Windows privilege escalation workstation
☆17Nov 22, 2015Updated 10 years ago
Alternatives and similar repositories for Privileged
Users that are interested in Privileged are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 8 years ago
- Get a clean, ready-to-go Linux box in seconds.☆25Mar 12, 2024Updated 2 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Sep 5, 2018Updated 7 years ago
- PHDAYS |||☆17May 23, 2013Updated 12 years ago
- Keylogger using FTP server as an intermediate with some cool additional functions☆22Apr 15, 2017Updated 8 years ago
- MiniPwner's website and forums aren't exactly clear on what you need to do. I'm here to help!☆20Jan 15, 2016Updated 10 years ago
- Pixel-perfect replica of Windows 10, simulated in the browser with Vanilla JS.☆17Dec 16, 2017Updated 8 years ago
- Todos los scripts y locuras del Blog SniferL4bs que sean desarrollados vendran en esta pequeña sección dedicada☆21Jun 22, 2024Updated last year
- AN ESP32/8266 is used to receive sensor data from clients and then log and display the results☆22Sep 24, 2022Updated 3 years ago
- Exploit web-vulnerabilities☆23Apr 9, 2019Updated 6 years ago
- Create lists from nmap output.☆13Jan 27, 2021Updated 5 years ago
- some example ctf writeups☆27Oct 23, 2020Updated 5 years ago
- Masking the Sethc.exe backdoor with an anti-detection system.☆29Dec 16, 2017Updated 8 years ago
- Bomb any SMS number with messages using existing E-Mail account.☆73Oct 1, 2020Updated 5 years ago
- A reverse shell cheat-sheet tool☆39Mar 5, 2019Updated 7 years ago
- Android Template Application to Demonstrate a number of Best Practises around Mobile Security☆10May 10, 2018Updated 7 years ago
- Linux bash script automation for metasploit☆268Jul 11, 2019Updated 6 years ago
- Gadget Pentesting Tool Scripts☆37Nov 29, 2015Updated 10 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Feb 14, 2018Updated 8 years ago
- One line PS scripts that may come handy during your network assesment☆80Mar 8, 2020Updated 6 years ago
- Nothing interesting to see here. Old hack on the nfc-tools code, mirror of http://nfc-tools.googlecode.com/svn/trunk — see README.md for …☆52Jul 30, 2020Updated 5 years ago
- The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more☆12Oct 4, 2018Updated 7 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- Python code to extract chrome cookie, history and login data files☆59Oct 29, 2017Updated 8 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- Arduino (Teensy) Based HID Attacks with Metasploit Modules☆12Feb 18, 2018Updated 8 years ago
- Hardening audit scripts validating Workstations and Servers based on CIS benchmarks☆16Aug 19, 2025Updated 7 months ago
- Shellcode异或加密工具☆12Mar 23, 2017Updated 9 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- ARM to pseudo code converter that rarely works☆14Dec 21, 2017Updated 8 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago