Linux Smart EnumerationLinux enumeration tool for pentesting and CTFs with verbosity levels
Stars: ✭ 1,956 (+9214.29%)
LuciferA Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+1338.1%)
PSeudoExecute PowerShell commands as Administrator in Windows 10 "like sudo"
Stars: ✭ 32 (+52.38%)
GtfonowAutomatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: ✭ 68 (+223.81%)
BCA-PhantomA multi-platform HTTP(S) Reverse Shell Server and Client in Python 3
Stars: ✭ 80 (+280.95%)
Privilege EscalationThis cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Stars: ✭ 2,117 (+9980.95%)
bentoBento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.
Stars: ✭ 74 (+252.38%)
WinpwnAutomation for internal Windows Penetrationtest / AD-Security
Stars: ✭ 1,303 (+6104.76%)
wpeARCHIVED: Use 'peh' instead
Stars: ✭ 17 (-19.05%)
ctrsploitA penetration toolkit for container environment
Stars: ✭ 47 (+123.81%)
STEWSA Security Tool for Enumerating WebSockets
Stars: ✭ 154 (+633.33%)
OrcaAdvanced Malware with multifeatures written in ASM/C/C++ , work on all windows versions ! (uncompleted)
Stars: ✭ 184 (+776.19%)
ClippyTerribad PrivEsc enumeration script for Windows systems
Stars: ✭ 15 (-28.57%)
DllspyDLL Hijacking Detection Tool
Stars: ✭ 202 (+861.9%)
Pentest-Service-EnumerationSuggests programs to run against services found during the enumeration phase of a Pentest
Stars: ✭ 80 (+280.95%)
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (+576.19%)
WeaponizeKali.shAutomate installation of extra pentest tools on Kali Linux
Stars: ✭ 233 (+1009.52%)
shadow-workersShadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious Service Workers (SW)
Stars: ✭ 168 (+700%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+5557.14%)
exploitCollection of different exploits
Stars: ✭ 153 (+628.57%)
PrivesccheckPrivilege Escalation Enumeration Script for Windows
Stars: ✭ 1,032 (+4814.29%)
byeintegrity3-uacBypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Stars: ✭ 24 (+14.29%)
DevBrute-A Password Brute ForcerDevBrute is a Password Brute Forcer, It can Brute Force almost all Social Media Accounts or Any Web Application.
Stars: ✭ 91 (+333.33%)
OscpCollection of things made during my OSCP journey
Stars: ✭ 709 (+3276.19%)
ggtfobinsGet GTFOBins info about a given exploit from the command line
Stars: ✭ 27 (+28.57%)
BrahmaBrahma - Privilege elevation exploit for Nintendo 3DS
Stars: ✭ 34 (+61.9%)
MailRipV3SMTP and IMAP checker / cracker for mailpass combolists with a user-friendly GUI, automated inbox test and many more features.
Stars: ✭ 28 (+33.33%)
default-http-login-hunterLogin hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.
Stars: ✭ 285 (+1257.14%)
adduser-dllSimple DLL that add a user to the local Administrators group
Stars: ✭ 48 (+128.57%)
LeprechaunThis tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.
Stars: ✭ 232 (+1004.76%)
penetration testing🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.
Stars: ✭ 57 (+171.43%)
YodoLocal Privilege Escalation
Stars: ✭ 203 (+866.67%)
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (+114.29%)
Pe LinuxLinux Privilege Escalation Tool By WazeHell
Stars: ✭ 168 (+700%)
reverse-sshStatically-linked ssh server with reverse shell functionality for CTFs and such
Stars: ✭ 548 (+2509.52%)
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (+585.71%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+54500%)
SharpLinkCreate file system symbolic links from low privileged user accounts within PowerShell
Stars: ✭ 51 (+142.86%)
PytmipePython library and client for token manipulations and impersonations for privilege escalation on Windows
Stars: ✭ 104 (+395.24%)
peniotPENIOT: Penetration Testing Tool for IoT
Stars: ✭ 164 (+680.95%)
Delete2systemWeaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM
Stars: ✭ 95 (+352.38%)
MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (+1747.62%)
Juicy PotatoA sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
Stars: ✭ 1,276 (+5976.19%)
webreconAutomated Web Recon Shell Scripts
Stars: ✭ 48 (+128.57%)
Kernel ExploitsMy proof-of-concept exploits for the Linux kernel
Stars: ✭ 1,173 (+5485.71%)
go-escalateThe goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS
Stars: ✭ 23 (+9.52%)
Sudo killerA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+5009.52%)
XposedOrNotXposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of such compromised passwords is detrimental to individual account security.
Stars: ✭ 120 (+471.43%)
OdatODAT: Oracle Database Attacking Tool
Stars: ✭ 906 (+4214.29%)
byeintegrity5-uacBypass UAC at any level by abusing the Task Scheduler and environment variables
Stars: ✭ 21 (+0%)
moonwalkCover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+2490.48%)
Deep-InsideCommand line tool that allows you to explore IoT devices by using Shodan API.
Stars: ✭ 22 (+4.76%)
NarthexModular personalized dictionary generator.
Stars: ✭ 156 (+642.86%)
byeintegrity2-uacBypass UAC by abusing the Internet Explorer Add-on installer
Stars: ✭ 46 (+119.05%)