Windows privilege escalation workstation
☆17Nov 22, 2015Updated 10 years ago
Alternatives and similar repositories for Privileged
Users that are interested in Privileged are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Sep 5, 2018Updated 7 years ago
- PHDAYS |||☆17May 23, 2013Updated 12 years ago
- Keylogger using FTP server as an intermediate with some cool additional functions☆22Apr 15, 2017Updated 8 years ago
- MiniPwner's website and forums aren't exactly clear on what you need to do. I'm here to help!☆20Jan 15, 2016Updated 10 years ago
- Exploit web-vulnerabilities☆23Apr 9, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Create lists from nmap output.☆13Jan 27, 2021Updated 5 years ago
- some example ctf writeups☆27Oct 23, 2020Updated 5 years ago
- Masking the Sethc.exe backdoor with an anti-detection system.☆29Dec 16, 2017Updated 8 years ago
- A reverse shell cheat-sheet tool☆39Mar 5, 2019Updated 7 years ago
- Auto save instagram users stories and posts☆32Mar 26, 2018Updated 8 years ago
- Linux bash script automation for metasploit☆269Jul 11, 2019Updated 6 years ago
- Gadget Pentesting Tool Scripts☆37Nov 29, 2015Updated 10 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Feb 14, 2018Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Telebix is an application that communicates with a Bot on the Telegram to receive commands and send information from an infrastructure mo…☆39Mar 19, 2019Updated 7 years ago
- Unofficial Slackware Linux Package Manager☆26Nov 9, 2025Updated 5 months ago
- Linux setup tool for Kali Linux☆80Sep 6, 2018Updated 7 years ago
- nmap - unofficial git fork☆19Aug 2, 2017Updated 8 years ago
- One line PS scripts that may come handy during your network assesment☆80Mar 8, 2020Updated 6 years ago
- An ESP8266-based Wake-on-LAN server☆33Aug 3, 2017Updated 8 years ago
- Nothing interesting to see here. Old hack on the nfc-tools code, mirror of http://nfc-tools.googlecode.com/svn/trunk — see README.md for …☆52Jul 30, 2020Updated 5 years ago
- The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more☆12Oct 4, 2018Updated 7 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Python code to extract chrome cookie, history and login data files☆60Oct 29, 2017Updated 8 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Live demonstration buttons for https://developers.google.com/pay/api/web/guides/resources/demos☆11Mar 16, 2026Updated 3 weeks ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Sample code demonstrating how to call the Google Pay Web Push Provisioning API.☆10Mar 29, 2026Updated 2 weeks ago
- Arduino (Teensy) Based HID Attacks with Metasploit Modules☆12Feb 18, 2018Updated 8 years ago
- Shellcode异或加密工具☆12Mar 23, 2017Updated 9 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- ARM to pseudo code converter that rarely works☆14Dec 21, 2017Updated 8 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Part of the aircrack-ng (experimental version) for the WiFi Pineapples, with custom scripts.☆23Oct 19, 2020Updated 5 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- This is a POC for the Fortigate OS Backdoor found in version 4.x up to 5.0.7☆28Jan 13, 2016Updated 10 years ago