Tips, Tricks, and Scripts for Linux Post Exploitation
☆38Mar 13, 2023Updated 3 years ago
Alternatives and similar repositories for Linux-Post-Exploitation
Users that are interested in Linux-Post-Exploitation are comparing it to the libraries listed below
Sorting:
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated last year
- A simple pentest container equipped with common python pentest tools.☆42Jan 30, 2026Updated last month
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Jul 21, 2023Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆52Jun 27, 2024Updated last year
- Work in progress...☆472Feb 24, 2026Updated 3 weeks ago
- ☆20Mar 21, 2024Updated last year
- ☆13Dec 21, 2023Updated 2 years ago
- Android Bug Hunting☆210Sep 6, 2024Updated last year
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Jan 2, 2025Updated last year
- ☆15Apr 5, 2023Updated 2 years ago
- ☆10Nov 9, 2023Updated 2 years ago
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Mar 20, 2023Updated 3 years ago
- ☆19Mar 4, 2023Updated 3 years ago
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆243Sep 6, 2024Updated last year
- You can check below blog post on attacks related to azure storage.☆13Apr 8, 2021Updated 4 years ago
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆35Mar 3, 2026Updated 2 weeks ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year
- A BurpSuite extension that allows you to use Chromium with PwnFox☆43Dec 23, 2025Updated 2 months ago
- 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE☆14Jun 19, 2022Updated 3 years ago
- A command-line utility for working with URLs.☆10Dec 8, 2025Updated 3 months ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- Automation with SSH for Hacking☆10Jan 28, 2025Updated last year
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Sep 2, 2022Updated 3 years ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆67Mar 27, 2023Updated 2 years ago
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆26May 26, 2020Updated 5 years ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Mar 6, 2023Updated 3 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆21Nov 20, 2021Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆78Dec 24, 2025Updated 2 months ago
- A port scanner written purely in PowerShell.☆83Sep 13, 2023Updated 2 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago