rtcrowley / linux-private-iLinks
Linux bash tool for Enumeration & Privilege Escalation
☆56Updated 6 years ago
Alternatives and similar repositories for linux-private-i
Users that are interested in linux-private-i are comparing it to the libraries listed below
Sorting:
- Repo contains a list of random scripts that I use while testing out random things.☆48Updated 6 years ago
- Miscellaneous pentesting scripts for OSCP☆59Updated 7 years ago
- Just a collection of pentest stuffs☆93Updated 5 years ago
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago
- Learnings from OSCP and other random stuff.☆31Updated last year
- Basics of Windows privilege escalation☆134Updated 8 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆90Updated 9 years ago
- ☆61Updated 7 years ago
- ☆52Updated 5 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆97Updated 8 years ago
- Collection of OSCP study material && tools.☆78Updated 6 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 9 years ago
- Linux setup tool for Kali Linux☆80Updated 7 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- penetration testing scripts☆136Updated 6 years ago
- For all your network pentesting needs☆154Updated last year
- Responsive Command and Control System☆102Updated 3 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 9 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆18Updated 6 years ago
- Custom tools and projects about security☆110Updated 4 months ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Updated 9 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 6 years ago
- Professionally Evil Web Application Penetration Testing 101☆146Updated 5 years ago
- ☆51Updated 9 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 7 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆46Updated 3 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago