segmentati0nf4ult / linux-pam-backdoorLinks
Linux PAM Backdoor
☆338Updated last year
Alternatives and similar repositories for linux-pam-backdoor
Users that are interested in linux-pam-backdoor are comparing it to the libraries listed below
Sorting:
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆280Updated 2 years ago
- Standalone binaries for Linux/Windows of Impacket's examples☆729Updated last year
- A small reverse shell for Linux & Windows☆607Updated last year
- MS17-010☆271Updated 2 years ago
- socks4 reverse proxy for penetration testing☆599Updated 6 years ago
- ☆162Updated 2 months ago
- An script to perform kerberos bruteforcing by using impacket☆451Updated 3 years ago
- Windows Local Privilege Escalation from Service Account to System☆821Updated 5 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆947Updated 7 years ago
- Proof of Concept for CVE-2019-18634☆215Updated 3 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,096Updated 4 years ago
- ☆160Updated 3 years ago
- Herramienta para evadir disable_functions y open_basedir☆433Updated last year
- linikatz is a tool to attack AD on UNIX☆561Updated last year
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆518Updated 2 years ago
- ☆211Updated 4 years ago
- Exploit Code for CVE-2020-1472 aka Zerologon☆384Updated 4 years ago
- Windows AV Evasion☆793Updated 5 years ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆621Updated 5 years ago
- NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The …☆353Updated last year
- A (partial) Python rewriting of PowerSploit's PowerView☆1,008Updated 3 months ago
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,123Updated 11 months ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆263Updated last year
- Exploit for zerologon cve-2020-1472☆666Updated 4 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆580Updated 10 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆607Updated 9 months ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆254Updated 2 years ago
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,340Updated 4 months ago
- A tool to make socks connections through HTTP agents☆707Updated 4 years ago
- Active Directory ACL exploitation with BloodHound☆728Updated 3 years ago