Linux bash tool for Enumeration & Privilege Escalation
☆57Jul 5, 2019Updated 6 years ago
Alternatives and similar repositories for linux-private-i
Users that are interested in linux-private-i are comparing it to the libraries listed below
Sorting:
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Sep 4, 2015Updated 10 years ago
- ☆11Nov 30, 2020Updated 5 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- A Powershell Privilege Escalation Enumeration Script.☆314Mar 14, 2018Updated 7 years ago
- A flat file social network for tilde servers☆15Sep 11, 2020Updated 5 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- python based backdoor software☆17Oct 14, 2011Updated 14 years ago
- ☆15May 17, 2018Updated 7 years ago
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- Symfony2 < 2.5.4 profiler exploit☆13Sep 30, 2015Updated 10 years ago
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆54Feb 10, 2026Updated 2 weeks ago
- Security Advisories and Researches☆15Aug 19, 2014Updated 11 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆10Dec 16, 2017Updated 8 years ago
- python keylogger and spying malware .☆15Apr 24, 2025Updated 10 months ago
- Java deserialization examples☆13Feb 6, 2019Updated 7 years ago
- ☆16Nov 15, 2022Updated 3 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Mar 11, 2021Updated 4 years ago
- An introduction to buffer overflow vulnerabilities exploitation.☆14Oct 21, 2022Updated 3 years ago
- ☆17Mar 10, 2018Updated 7 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- Effectively search the Exploit-DB☆15Apr 16, 2020Updated 5 years ago
- A Python script to create an administrator account on Joomla! 1.6/1.7/2.5 using a privilege escalation vulnerability☆22Feb 11, 2025Updated last year
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Oct 31, 2019Updated 6 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆17Aug 6, 2019Updated 6 years ago
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- ☆61Mar 16, 2018Updated 7 years ago
- Pentesting Pratic Notes☆15Oct 30, 2021Updated 4 years ago
- Concurrently test bing results for shellshock vulnerability☆42Sep 27, 2014Updated 11 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago
- ☆14Jul 15, 2018Updated 7 years ago
- Suggests programs to run against services found during the enumeration phase of a Pentest☆115Oct 25, 2025Updated 4 months ago