Tips, Tricks, and Scripts for Linux Post Exploitation
☆38Mar 13, 2023Updated 3 years ago
Alternatives and similar repositories for Linux-Post-Exploitation
Users that are interested in Linux-Post-Exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated last year
- A simple pentest container equipped with common python pentest tools.☆43Jan 30, 2026Updated 2 months ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Jul 21, 2023Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆52Jun 27, 2024Updated last year
- Work in progress...☆475Feb 24, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆20Mar 21, 2024Updated 2 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- Android Bug Hunting☆210Sep 6, 2024Updated last year
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Jan 2, 2025Updated last year
- ☆15Apr 5, 2023Updated 3 years ago
- ☆31Mar 21, 2023Updated 3 years ago
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Mar 20, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆243Sep 6, 2024Updated last year
- You can check below blog post on attacks related to azure storage.☆13Apr 8, 2021Updated 5 years ago
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆35Mar 24, 2026Updated 2 weeks ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 3 years ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year
- A command-line utility for working with URLs.☆10Dec 8, 2025Updated 4 months ago
- 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE☆14Jun 19, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- Playground for Race Condition attack☆24Mar 18, 2023Updated 3 years ago
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated 2 years ago
- A BurpSuite extension that allows you to use Chromium with PwnFox☆43Dec 23, 2025Updated 3 months ago
- Automation with SSH for Hacking☆10Jan 28, 2025Updated last year
- A collection of small scripts and tools for deobfuscation and malware analysis.☆67Mar 27, 2023Updated 3 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Sep 2, 2022Updated 3 years ago
- Spark Application UI extension for JupyterLab☆12Sep 5, 2021Updated 4 years ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Mar 6, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆26May 26, 2020Updated 5 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆79Dec 24, 2025Updated 3 months ago
- 𝘔𝘢𝘯𝘺 𝘰𝘧 𝘵𝘩𝘦𝘴𝘦 𝘴𝘤𝘳𝘪𝘱𝘵𝘴 𝘢𝘳𝘦 𝘤𝘰𝘭𝘭𝘦𝘤𝘵𝘦𝘥 𝘧𝘳𝘰𝘮 𝘤𝘰𝘶𝘳𝘴𝘦𝘴, 𝘣𝘭𝘰𝘨𝘴, 𝘤𝘰𝘮𝘮𝘶𝘯𝘪𝘵𝘺 𝘳𝘦𝘴𝘰𝘶𝘳𝘤�…☆28Nov 30, 2025Updated 4 months ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆118Mar 25, 2023Updated 3 years ago
- ☆20Jul 7, 2024Updated last year