Linux bash tool for Enumeration & Privilege Escalation
☆57Jul 5, 2019Updated 6 years ago
Alternatives and similar repositories for linux-private-i
Users that are interested in linux-private-i are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Surgical python tool to assist in LFI discovery☆13Sep 2, 2018Updated 7 years ago
- ☆11Nov 30, 2020Updated 5 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- Useful commands for pentesting Linux and Windows systems☆14Jul 18, 2020Updated 5 years ago
- Java deserialization examples☆13Feb 6, 2019Updated 7 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Sep 4, 2015Updated 10 years ago
- Simple X11 based desktop pager☆10Mar 29, 2025Updated 11 months ago
- Scripts and One-Liners☆20Jan 31, 2025Updated last year
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Mar 11, 2021Updated 5 years ago
- Insecure Deserialization, PDF and lab☆18Nov 19, 2019Updated 6 years ago
- A refresh of LazyKali which simplifies install of tools and configuration. Original author appears missing.☆48Sep 4, 2016Updated 9 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Oct 31, 2019Updated 6 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- Suggests programs to run against services found during the enumeration phase of a Pentest☆116Oct 25, 2025Updated 4 months ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- An introduction to buffer overflow vulnerabilities exploitation.☆14Oct 21, 2022Updated 3 years ago
- python keylogger and spying malware .☆15Apr 24, 2025Updated 10 months ago
- Linpeas optimization tool☆13Feb 3, 2022Updated 4 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- Read only mirror. To contribute or submit issues, please go to the website link --->☆15Jul 25, 2023Updated 2 years ago
- ☆19Apr 29, 2019Updated 6 years ago
- ☆15May 17, 2018Updated 7 years ago
- ☆14Apr 20, 2020Updated 5 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26May 1, 2020Updated 5 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆19Aug 6, 2019Updated 6 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- A simple jamming attack with GNU randio and gaussian noise source☆13Mar 28, 2019Updated 6 years ago
- Security Advisories and Researches☆15Aug 19, 2014Updated 11 years ago
- ☆61Mar 16, 2018Updated 8 years ago
- A Python script to create an administrator account on Joomla! 1.6/1.7/2.5 using a privilege escalation vulnerability☆22Feb 11, 2025Updated last year
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Jan 29, 2019Updated 7 years ago