Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for privilege escalation post exploitation
post-exploitation
x
privilege-escalation
x
11 search results found
Phpsploit
⭐
2,000
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Torat
⭐
907
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Gtfonow
⭐
414
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Windows Post Exploitation
⭐
324
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Awesome Cyber Security
⭐
255
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
Hatsploit
⭐
236
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Leprechaun
⭐
236
This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.
Gtfo
⭐
76
Search for Unix binaries that can be exploited to bypass system security restrictions.
Forceadmin
⭐
53
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
Peh
⭐
37
Post exploitation helper
Linpwn
⭐
36
Interactive Post Exploitation Tool
1-11 of 11 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.