Linux bash tool for Enumeration & Privilege Escalation
☆57Jul 5, 2019Updated 6 years ago
Alternatives and similar repositories for linux-private-i
Users that are interested in linux-private-i are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Useful commands for pentesting Linux and Windows systems☆14Jul 18, 2020Updated 5 years ago
- A Powershell Privilege Escalation Enumeration Script.☆314Mar 14, 2018Updated 8 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆22Mar 11, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Insecure Deserialization, PDF and lab☆18Nov 19, 2019Updated 6 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Oct 31, 2019Updated 6 years ago
- Suggests programs to run against services found during the enumeration phase of a Pentest☆117Mar 26, 2026Updated last month
- Bash library for pretty-printing a variable given by name.☆19Jun 15, 2025Updated 10 months ago
- This repository contains the source code of the web panel I have used in my book series of books: Cyber and Penetration Testing – Web Pen…☆48Jan 11, 2023Updated 3 years ago
- Linpeas optimization tool☆13Feb 3, 2022Updated 4 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆19Apr 29, 2019Updated 7 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26May 1, 2020Updated 6 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆19Aug 6, 2019Updated 6 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- Symfony2 < 2.5.4 profiler exploit☆13Sep 30, 2015Updated 10 years ago
- Security Advisories and Researches☆15Aug 19, 2014Updated 11 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆61Mar 16, 2018Updated 8 years ago
- Ansible deploy script for our websites at SFI.ru☆10Nov 20, 2017Updated 8 years ago
- A Python script to create an administrator account on Joomla! 1.6/1.7/2.5 using a privilege escalation vulnerability☆22Feb 11, 2025Updated last year
- ☆16May 17, 2018Updated 7 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Jan 29, 2019Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- python based backdoor software☆17Oct 14, 2011Updated 14 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- oscp-ctf is a small collection of basic Bash scripts that make life easier and save time whether you are in the OSCP labs, HackThebox or …☆66Jun 29, 2019Updated 6 years ago
- Resolvn Threat Hunting Virtual Machine☆138Aug 16, 2019Updated 6 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 7 years ago
- Effectively search the Exploit-DB☆15Apr 16, 2020Updated 6 years ago
- Offsec Pentest and Bug Bounty Notes☆24May 28, 2020Updated 5 years ago