thehappydinoa / rootOS
macOS Privilege Escalation Helper
☆142Updated 2 months ago
Alternatives and similar repositories for rootOS:
Users that are interested in rootOS are comparing it to the libraries listed below
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- Encrypted exploit delivery for the masses☆267Updated 5 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- JavaScript Reversed TCP Meterpreter Stager☆137Updated 7 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆90Updated 11 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Common password pattern generator using strings list☆132Updated 4 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 8 years ago
- Office for Mac Macro Payload Generator☆241Updated 7 years ago
- ☆122Updated 7 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆127Updated last year
- Basics of Windows privilege escalation☆133Updated 7 years ago
- A Metasploit auto auxiliary script☆104Updated 2 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49Updated 6 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- Example VBA Macro for MacOS Mojave☆67Updated 6 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 6 years ago
- My collection of metasploit auxiliary post-modules☆191Updated 5 years ago
- Miscellaneous tools and patches that I have written/hacked/forked over the years☆62Updated 13 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆210Updated 7 years ago
- Exploits and advisories☆190Updated 4 years ago
- Platform independent peCloak fork based on Capstone☆106Updated 9 years ago
- ☆59Updated 4 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 6 years ago
- For all your network pentesting needs☆154Updated 10 months ago
- Linux Privilege Escalation Tool☆184Updated 6 years ago
- ☆57Updated 4 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- CVE-2020-0796 Pre-Auth POC☆85Updated 5 years ago