reider-roque / linpostexpLinks
Linux post exploitation enumeration and exploit checking tools
☆182Updated 5 years ago
Alternatives and similar repositories for linpostexp
Users that are interested in linpostexp are comparing it to the libraries listed below
Sorting:
- Windows Pentest Scripts☆231Updated 7 years ago
- Penetration testing scripts☆145Updated 7 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆259Updated 4 years ago
- Collection of things made during my preparation to take on OSCE☆189Updated 3 years ago
- Search Exploitable Software on Linux☆231Updated 2 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆329Updated 2 years ago
- Github for the scripts utilised during Penetration test☆235Updated 8 years ago
- The Hacker Playbook 3 - Web Commands☆85Updated 7 years ago
- Basics of Windows privilege escalation☆134Updated 8 years ago
- ☆208Updated 4 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆238Updated 3 years ago
- Fuzzbunch deployment for Debian - Intructions: Readme.md☆142Updated 2 months ago
- Linux Privilege Escalation Tool☆185Updated 6 years ago
- Check for valid credentials across a network over SMB☆268Updated last year
- Custom tools and projects about security☆111Updated 5 months ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆294Updated 6 years ago
- an asynchronous target enumeration tool☆245Updated 3 years ago
- An exploit for Apache Struts CVE-2018-11776☆302Updated 7 years ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆250Updated 8 years ago
- Collection of different exploits☆183Updated 5 years ago
- Simple reverse ICMP shell☆132Updated 11 years ago
- Local UNIX PrivEsc Aggregation☆244Updated 9 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆504Updated 5 years ago
- Burp extension to perform Java Deserialization Attacks☆216Updated last year
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆208Updated 3 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆285Updated 4 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Updated 7 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆268Updated 7 years ago
- All my infosec notes I have been building up over the years☆336Updated 10 months ago
- Some of the scripts I use.