Stars
10
Forks
3
Language
Python
Last Updated
Apr 10, 2024
Similar Repos
Repo | Language | Stars | Description | Updated At |
---|---|---|---|---|
C | 245 | Linux post exploitation privilege escalation enumeration | Feb 18, 2024 | |
Python | 3 | Burp plugin which supports in finding privilege escalation vulnerabilities | Aug 03, 2022 | |
Python | 434 | Identify privilege escalation paths within and across different clouds | Aug 23, 2022 | |
None | 4 | A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux … | Jun 28, 2022 | |
C | 1594 | A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux … | Aug 19, 2022 | |
None | 71 | Process Monitor filter for finding privilege escalation vulnerabilities on Windows | Aug 03, 2022 | |
C# | 1393 | Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities | May 11, 2023 | |
Batchfile | 83 | Batch file to help automate Windows enumeration for privilege escalation | Jun 23, 2022 | |
C | 45 | PostgreSQL extension allowing privilege escalation with enhanced logging and control | Apr 15, 2023 | |
None | 5 | Windows batch script that finds misconfiguration issues which can lead to privilege escalation. | Oct 07, 2022 | |
PowerShell | 425 | Windows batch script that finds misconfiguration issues which can lead to privilege escalation. | May 28, 2023 | |
PowerShell | 12 | Powershell script to automate finding privilege escalation vectors in windows environments. | Feb 11, 2023 | |
PowerShell | 2 | PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities. | Jun 26, 2022 | |
PowerShell | 1727 | PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities. | May 12, 2023 | |
None | 2 | PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities. | Oct 22, 2022 | |
Shell | 3 | This is a collection of post exploitation and privilege escalation tools for both linux and … | Jul 06, 2022 | |
C | 129 | PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations … | Apr 25, 2023 | |
None | 806 | A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs. | Aug 22, 2022 | |
Python | 195 | A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team. | Aug 19, 2022 | |
Shell | 514 | Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, … | Oct 31, 2022 | |
Shell | 14 | This lab demonstrates some of the security concerns of a default Kubernetes Engine cluster configuration … | Mar 23, 2022 | |
None | 3 | Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege … | Aug 06, 2021 | |
None | 2 | Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege … | May 12, 2022 | |
JavaScript | 6 | A GitHub Action that uses OpenAI's GPT to identify security and privacy vulnerabilities and comment … | Apr 17, 2023 | |
None | 6 | Tsunami is a general purpose network security scanner with an extensible plugin system for detecting … | Jan 09, 2022 | |
Java | 7592 | Tsunami is a general purpose network security scanner with an extensible plugin system for detecting … | Aug 09, 2022 | |
C++ | 59 | A list of excellent resources for anyone to deepen their understanding with regards to Windows … | May 02, 2023 | |
Shell | 5 | WARNING This patches AMD's proprietary driver. For all I know, it could enable privilege escalation. … | Dec 09, 2020 | |
Python | 5 | An application that finds current security vulnerabilities and lists them with a graphical interface. It … | Apr 12, 2023 | |
PHP | 16 | PrestaScan Security is a PrestaShop module allowing you to scan your PrestaShop website to identify … | May 12, 2023 | |
Python | 33 | A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records … | May 16, 2023 | |
Shell | 19 | EnumVolcano is an open source Bash script which is used to perform automated enumeration for … | Jun 03, 2022 | |
PowerShell | 2 | Portia aims to automate a number of techniques commonly performed on internal network penetration tests … | Feb 12, 2018 | |
PowerShell | 159 | Portia aims to automate a number of techniques commonly performed on internal network penetration tests … | Apr 02, 2023 | |
Python | 6 | Sechead is a powerful security tool developed in Python that allows users to audit the … | May 23, 2023 | |
C | 17 | A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of … | Apr 02, 2023 | |
C | 575 | Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State … | Apr 30, 2023 | |
C | 9 | This code example allows you to create a malware.exe sample that can be run in … | May 09, 2023 | |
Python | 2 | This simple network scanner scans a user-defined IP address for open ports within a specified … | Apr 18, 2023 | |
Python | 5 | Overwhelm's Vanquish is a Kali Linux based Enumeration Orchestrator built in Python running inside a … | Feb 19, 2022 | |
PHP | 4 | vulnscanner is a web application source code vulnerability scanner. It could be used to detect … | Apr 22, 2023 | |
None | 33 | The Susbstrate Open Working Groups (SOWG) are community-based mechanisms to develop standards, specifications, implementations, guidelines … | May 21, 2022 | |
Shell | 4 | IP Checker is a Bash tool that checks if an IP address or a list … | Apr 22, 2023 | |
Python | 112 | browser_vuln_check ,利用已知的浏览器漏洞PoC 来快速检测Webview 和浏览器环境是否存在安全漏洞,只需要访问run.html 即可获取所有扫描结果,适用场景包含:APP 发布之前的内部安全测试,第三方Webview 漏洞检测等(browser_vuln_check framework using some known browser vulnerabilities PoC to … | Jan 16, 2023 | |
None | 2 | This is a small boot2root VM I created for my university’s cyber security group. It … | Jun 23, 2022 | |
None | 4 | This is a boot2root VM and is a continuation of the Basic Pentesting series. This … | Mar 13, 2023 | |
Jupyter Notebook | 17 | The ability to manipulate domains and domain walls underpins function in a range of next-generation … | Mar 26, 2023 | |
Python | 3 | Eulerian Video Magnification | Jan 22, 2022 | |
Python | 3 | Repology bulk exporter | Aug 12, 2022 | |
Python | 3 | Repology vulnerability data updating daemon | Jun 10, 2022 |