rtcrowley / linux-private-iLinks
Linux bash tool for Enumeration & Privilege Escalation
☆57Updated 6 years ago
Alternatives and similar repositories for linux-private-i
Users that are interested in linux-private-i are comparing it to the libraries listed below
Sorting:
- Just a collection of pentest stuffs☆93Updated 5 years ago
- Miscellaneous pentesting scripts for OSCP☆59Updated 7 years ago
- Basics of Windows privilege escalation☆134Updated 8 years ago
- Repo contains a list of random scripts that I use while testing out random things.☆48Updated 6 years ago
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆91Updated 9 years ago
- ☆61Updated 7 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆97Updated 8 years ago
- ☆52Updated 5 years ago
- Learnings from OSCP and other random stuff.☆31Updated last year
- Browse and search through nmap's NSE scripts.☆58Updated 8 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 9 years ago
- Collection of OSCP study material && tools.☆78Updated 6 years ago
- Linux setup tool for Kali Linux☆80Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆105Updated 3 years ago
- Custom tools and projects about security☆110Updated 6 months ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- ☆96Updated 7 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 12 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆142Updated 3 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆156Updated 10 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Updated 9 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 7 years ago
- Hacking challenges☆31Updated 8 years ago
- For all your network pentesting needs☆154Updated last year
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 6 years ago
- Professionally Evil Web Application Penetration Testing 101☆148Updated 5 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 7 years ago
- Discover target social media profiles☆81Updated 3 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Updated 8 years ago