thehappydinoa / rootOSLinks
macOS Privilege Escalation Helper
☆142Updated 11 months ago
Alternatives and similar repositories for rootOS
Users that are interested in rootOS are comparing it to the libraries listed below
Sorting:
- A Metasploit auto auxiliary script☆103Updated 3 years ago
- A simple embedded Linux backdoor.☆199Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- cve-2018-10933 libssh authentication bypass☆109Updated 7 years ago
- Common password pattern generator using strings list☆131Updated 5 years ago
- unix SSH post-exploitation 1337 tool☆142Updated 7 years ago
- Slides from my talk at ISC 2018 in Beijing 2018☆94Updated 6 years ago
- Exfiltrate data with ICMP☆102Updated 7 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Updated 6 years ago
- Linux Privilege Escalation Tool☆186Updated 6 years ago
- A simple tool to convert the IP to a DWORD IP☆143Updated 3 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- Exploits and advisories☆207Updated last month
- ☆122Updated 7 years ago
- Linux Local Privesc Helper and Agent☆167Updated 6 years ago
- Android and iOS source for the Empire mobile app☆90Updated 6 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50Updated 7 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Updated 9 years ago
- Platform independent peCloak fork based on Capstone☆107Updated 9 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Updated 9 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 12 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 3 years ago
- Encrypted exploit delivery for the masses☆270Updated 6 years ago
- ☆102Updated 6 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆126Updated 6 years ago
- ☆23Updated 9 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 8 years ago
- BlueKeep scanner supporting NLA☆167Updated 6 years ago