Downloads, Hacking Tools, Hackthebox, Oscp, Pentesting, Privilege Escalation
First, a couple of useful oneliners 😉 wget “https://github.com/diego-treitos/linux-smart-enumeration/releases/latest/download/lse.sh” -O lse.sh;chmod 700 lse.sh curl “https://github.com/diego-treitos/linux-smart-enumeration/releases/latest/download/lse.sh” -Lo lse.sh;chmod 700 lse.sh Note …
304
Downloads, eBPF, Hacking Tools, Privilege Escalation, Real-Time, Rootkit, Virtual Machine
VED (Vault Exploit Defense)-eBPF leverages eBPF (extended Berkeley Packet Filter) to implement runtime kernel security monitoring and exploit detection for …
305
Downloads, Hacking Tools, Privilege Escalation, Remote, Rootkit, SSH
A Linux persistence tool! A powerful and versatile Linux persistence script designed for various security assessment and testing scenarios. This …
354
Downloads, Hacking Tools, Privilege Escalation, Windows
Based on the history of Potato privilege escalation for 6 years, from the beginning of RottenPotato to the end of …
434
Downloads, Hacking Tools, Privilege Escalation, Python, Registry, Registry Key, Windows
PXEThief is a set of tooling that implements attack paths discussed at the DEF CON 30 talk Pulling Passwords out …
419
Downloads, Hacking Tools, Neo4J, Node, Privesc, Privilege, Privilege Escalation, Python, Python Package
autobloody is a tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound. Description This tool automates the …
551
Downloads, Hacking Tools, Infosectools, Privilege Escalation, Redteam Tools
A standalone python3 remake of the classic “tree” command with the additional feature of searching for user provided keywords/regex in …
477
Downloads, Hacking Tools, NTLM, Privilege Escalation, Windows
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 9 methods. Features Automatically …
518
Downloads, Hacking Tools, Kerberos, LDAP, Logging, Privilege Escalation, Python3, SMB
Aced is a tool to parse and resolve a single targeted Active Directory principal’s DACL. Aced will identify interesting inbound …
510
Downloads, Hacking Tools, Kerberos, NTLM, Privilege, Privilege Escalation, Vulnerable
This tool is designed to aid an operator in modifying ADCS certificate templates so that a created vulnerable state can …
492