A *nix Enumerator & Auto Privilege Escalation tool.
☆150Nov 19, 2021Updated 4 years ago
Alternatives and similar repositories for rootend
Users that are interested in rootend are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆156Mar 31, 2024Updated last year
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆258Mar 6, 2025Updated last year
- A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating sys…☆491Jul 23, 2020Updated 5 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆100Dec 8, 2022Updated 3 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Sustainable shellcode evasion☆113Updated this week
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆91May 10, 2020Updated 5 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- ☆185Jan 5, 2021Updated 5 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Nov 22, 2025Updated 4 months ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Dec 22, 2021Updated 4 years ago
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- A tool to search Aviation-related intelligence from public sources. Aviation OSINT☆35Jan 31, 2026Updated last month
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆201Sep 21, 2021Updated 4 years ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- This is a program written in python which allows you to log in with different sql injections that allow you to bypass some login pages (F…☆12Feb 23, 2023Updated 3 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last week
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆214Nov 26, 2020Updated 5 years ago
- Collection of beacon object files for use with Cobalt Strike to facilitate 🐚.☆186Feb 11, 2021Updated 5 years ago
- Exploit to SYSTEM for CVE-2021-21551☆235May 20, 2021Updated 4 years ago
- Self-developed tools for Lateral Movement/Code Execution☆719Aug 17, 2021Updated 4 years ago
- An advanced graphical search engine for Exploit-DB☆120May 29, 2024Updated last year
- A novel technique to communicate between threads using the standard ETHREAD structure☆116Feb 27, 2021Updated 5 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆75Feb 9, 2022Updated 4 years ago
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆74Apr 25, 2023Updated 2 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆58Sep 7, 2023Updated 2 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- About All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆67Nov 22, 2020Updated 5 years ago
- PowerShell Script Obfuscator☆597Nov 2, 2023Updated 2 years ago
- C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed☆243Aug 12, 2020Updated 5 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 5 years ago