Tips, Tricks, and Scripts for Linux Post Exploitation
☆37Mar 13, 2023Updated 3 years ago
Alternatives and similar repositories for Linux-Post-Exploitation
Users that are interested in Linux-Post-Exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated last year
- A simple pentest container equipped with common python pentest tools.☆43Jan 30, 2026Updated 3 months ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Jul 21, 2023Updated 2 years ago
- Work in progress...☆477Apr 18, 2026Updated last month
- ☆20Mar 21, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆13Dec 21, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆96Jan 2, 2025Updated last year
- ☆10Nov 9, 2023Updated 2 years ago
- ☆32Mar 21, 2023Updated 3 years ago
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Mar 20, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- ☆19Mar 4, 2023Updated 3 years ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆245Sep 6, 2024Updated last year
- You can check below blog post on attacks related to azure storage.☆13Apr 8, 2021Updated 5 years ago
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆35May 12, 2026Updated last week
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 3 years ago
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year
- Offensive recon with GitHub Actions☆12Aug 25, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE☆14Jun 19, 2022Updated 3 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated 2 years ago
- Playground for Race Condition attack☆24Mar 18, 2023Updated 3 years ago
- A BurpSuite extension that allows you to use Chromium with PwnFox☆48Dec 23, 2025Updated 4 months ago
- Automation with SSH for Hacking☆10Jan 28, 2025Updated last year
- A collection of small scripts and tools for deobfuscation and malware analysis.☆67Mar 27, 2023Updated 3 years ago
- Spark Application UI extension for JupyterLab☆12Sep 5, 2021Updated 4 years ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Mar 6, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆26May 26, 2020Updated 5 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆51Nov 8, 2022Updated 3 years ago
- List of Awesome macOS Red Teaming Resources.☆243Apr 15, 2022Updated 4 years ago
- A Wall of Sheep for a WiFi Pineapple, a customized version of DWall☆12Dec 12, 2016Updated 9 years ago
- A port scanner written purely in PowerShell.☆83Sep 13, 2023Updated 2 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆119Mar 25, 2023Updated 3 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 3 years ago