A *nix Enumerator & Auto Privilege Escalation tool.
☆150Nov 19, 2021Updated 4 years ago
Alternatives and similar repositories for rootend
Users that are interested in rootend are comparing it to the libraries listed below
Sorting:
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆258Mar 6, 2025Updated 11 months ago
- A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating sys…☆492Jul 23, 2020Updated 5 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆156Mar 31, 2024Updated last year
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆91May 10, 2020Updated 5 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆214Nov 26, 2020Updated 5 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Dec 22, 2021Updated 4 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆82Jul 30, 2021Updated 4 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 4 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆100Dec 8, 2022Updated 3 years ago
- Red Team C2 and Post Exploitation code☆35Jul 8, 2025Updated 7 months ago
- Collection of beacon object files for use with Cobalt Strike to facilitate 🐚.☆185Feb 11, 2021Updated 5 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- Exploit to SYSTEM for CVE-2021-21551☆235May 20, 2021Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- Sustainable shellcode evasion☆112Dec 11, 2024Updated last year
- ☆185Jan 5, 2021Updated 5 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- A Python obfuscator using HTTP Requests and Hastebin.☆50Jul 1, 2022Updated 3 years ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆200Sep 21, 2021Updated 4 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆75Feb 9, 2022Updated 4 years ago
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆426Apr 22, 2021Updated 4 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- PowerShell Script Obfuscator☆597Nov 2, 2023Updated 2 years ago
- An advanced graphical search engine for Exploit-DB☆120May 29, 2024Updated last year
- A novel technique to communicate between threads using the standard ETHREAD structure☆116Feb 27, 2021Updated 5 years ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed☆244Aug 12, 2020Updated 5 years ago
- Perform automated network reconnaissance scans☆238May 4, 2023Updated 2 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- About All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆68Nov 22, 2020Updated 5 years ago
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆74Apr 25, 2023Updated 2 years ago