Scan your AWS IAM Configuration for shadow admins in AWS IAM based on misconfigured deny policies not affecting users in …
Kconfig-Hardened-Check – A Tool For Checking The Hardening Options In The Linux Kernel Config
Motivation There are plenty of Linux kernel hardening config options. A lot of them are not enabled by the major …
Traitor – Automatic Linux Privesc Via Exploitation Of Low-Hanging Fruit E.G. GTFOBin
Automatically exploit low-hanging fruit to pop a root shell. Linux privilege escalation made easy! Traitor packages up a bunch of …
ATTPwn – Tool Designed To Emulate Adversaries
ATTPwn is a computer security tool designed to emulate adversaries. The tool aims to bring emulation of a real threat …
WSuspicious – A Tool To Abuse Insecure WSUS Connections For Privilege Escalations
This is a proof of concept program to escalate privileges on a Windows host by abusing WSUS. Details in this …