Tips, Tricks, and Scripts for Linux Post Exploitation
☆38Mar 13, 2023Updated 2 years ago
Alternatives and similar repositories for Linux-Post-Exploitation
Users that are interested in Linux-Post-Exploitation are comparing it to the libraries listed below
Sorting:
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Jul 21, 2023Updated 2 years ago
- ☆25Aug 19, 2024Updated last year
- A simple pentest container equipped with common python pentest tools.☆42Jan 30, 2026Updated 3 weeks ago
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆26May 26, 2020Updated 5 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Jun 27, 2024Updated last year
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated 11 months ago
- You can check below blog post on attacks related to azure storage.☆13Apr 8, 2021Updated 4 years ago
- Recon scripts for bug hunting☆10Nov 19, 2021Updated 4 years ago
- ☆23Feb 13, 2026Updated 2 weeks ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Mar 6, 2023Updated 2 years ago
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆35Feb 17, 2026Updated last week
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- ☆31Mar 21, 2023Updated 2 years ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- Powerful advanced web platform for C2 managing and automated penetration testing.☆15Jun 30, 2023Updated 2 years ago
- Work in progress...☆470Updated this week
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- ☆14Sep 30, 2020Updated 5 years ago
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Mar 20, 2023Updated 2 years ago
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- ☆19Mar 4, 2023Updated 2 years ago
- ☆15Apr 5, 2023Updated 2 years ago
- Various pentesting scripts, focusing on iOS and network security☆14Oct 31, 2019Updated 6 years ago
- some sploits☆19Sep 20, 2024Updated last year
- Static and Dynamic Analysis of Malware Samples☆12Mar 12, 2020Updated 5 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Jan 2, 2025Updated last year
- Android Bug Hunting☆210Sep 6, 2024Updated last year
- A collection of small scripts and tools for deobfuscation and malware analysis.☆67Mar 27, 2023Updated 2 years ago
- Proof of Concepts for malicious maintainers: How to Tamper with Releases built with GitHub Actions Worfklows, presented at fwd:cloudsec E…☆78Sep 16, 2025Updated 5 months ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- ☆20Mar 21, 2024Updated last year
- Burp Suite Proxy Toggler Lite Add-on for Mozilla Firefox.☆34Nov 29, 2025Updated 3 months ago
- Collection of various malware techniques aimed at Windows through MinGW☆16Aug 24, 2024Updated last year
- Smilex-Eye is a high-speed, advanced OSINT suite that bridges the gap between raw global internet data and actionable security intelligen…☆34Jan 4, 2026Updated last month
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Sep 2, 2022Updated 3 years ago