1N3 / Privesc
A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786
Programming Languages
c
50402 projects - #5 most used programming language
Projects that are alternatives of or similar to Privesc
Getjs
A tool to fastly get all javascript sources/files
Stars: ✭ 190 (-75.83%)
Mutual labels: hacking, pentesting, bugbounty
Cloudbrute
Awesome cloud enumerator
Stars: ✭ 268 (-65.9%)
Mutual labels: hacking, pentesting, bugbounty
Onelistforall
Rockyou for web fuzzing
Stars: ✭ 213 (-72.9%)
Mutual labels: hacking, pentesting, bugbounty
Awesome Mobile Security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+133.72%)
Mutual labels: hacking, pentesting, bugbounty
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (-39.69%)
Mutual labels: hacking, pentesting, exploits
Quiver
Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-82.19%)
Mutual labels: hacking, pentesting, bugbounty
Huge Collection Of Cheatsheet
Share of my Huge Collection of Cheatsheet (Coding, Cheat, Pinouts, Command Lists, Etc.)
Stars: ✭ 250 (-68.19%)
Mutual labels: sql, mysql, pentesting
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-45.67%)
Mutual labels: hacking, pentesting, bugbounty
Offensive Docker
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-58.27%)
Mutual labels: hacking, pentesting, bugbounty
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-92.11%)
Mutual labels: hacking, pentesting, bugbounty
Security whitepapers
Collection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQLi
Stars: ✭ 644 (-18.07%)
Mutual labels: hacking, pentesting, bugbounty
Spellbook
Micro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-93.26%)
Mutual labels: hacking, pentesting, exploits
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-76.84%)
Mutual labels: hacking, pentesting, bugbounty
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+1042.62%)
Mutual labels: hacking, pentesting, bugbounty
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (-35.24%)
Mutual labels: hacking, pentesting, bugbounty
Nopcommerce
The most popular open-source eCommerce shopping cart solution based on ASP.NET Core
Stars: ✭ 6,827 (+768.58%)
Mutual labels: sql, mysql
[email protected]
PrivEsc byABOUT:
A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
LINKS:
For pre-compiled local linux exploits, check out https://www.kernel-exploits.com.
DONATIONS:
Donations are welcome.
- [x] BTC 1Fav36btfmdrYpCAR65XjKHhxuJJwFyKum
- [x] DASH XoWYdMDGb7UZmzuLviQYtUGb5MNXSkqvXG
- [x] ETH 0x20bB09273702eaBDFbEE9809473Fd04b969a794d
- [x] LTC LQ6mPewec3xeLBYMdRP4yzeta6b9urqs2f
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].