Linux post exploitation enumeration and exploit checking tools
☆182Apr 13, 2020Updated 5 years ago
Alternatives and similar repositories for linpostexp
Users that are interested in linpostexp are comparing it to the libraries listed below
Sorting:
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Post Exploitation Collection☆1,570May 1, 2020Updated 5 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆76May 21, 2024Updated last year
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- WeakNet PHP Execution Shell☆31Oct 14, 2015Updated 10 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Shell script for testing DNS zone transfer (AXFR query) on domains and subdomains recursively.☆49Dec 6, 2020Updated 5 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆61May 11, 2015Updated 10 years ago
- Windows batch script that finds misconfiguration issues which can lead to privilege escalation.☆672Dec 1, 2024Updated last year
- PowerShell Runspace Post Exploitation Toolkit☆1,548Aug 2, 2019Updated 6 years ago
- Penetration testing scripts☆145May 14, 2018Updated 7 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆823Apr 11, 2023Updated 2 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Attack Knowledge Base☆101Jul 5, 2017Updated 8 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- Damn Vulnerable File Upload V 1.1☆102May 26, 2018Updated 7 years ago
- Rid_enum is a null session RID cycle attack for brute forcing domain controllers.☆308Jul 28, 2024Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,847Sep 6, 2023Updated 2 years ago
- Post Exploitation Wiki☆524Dec 18, 2019Updated 6 years ago
- Windows Privesc Check - PowerShell☆67Apr 22, 2022Updated 3 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆985Dec 13, 2017Updated 8 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- Local Privilege Escalation☆210Feb 28, 2017Updated 9 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆760Jan 28, 2019Updated 7 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 6 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- ☆164Aug 28, 2015Updated 10 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆306Oct 27, 2017Updated 8 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago