Downloads, Hacking Tools, Hackthebox, Oscp, Pentesting, Privilege EscalationFirst, a couple of useful oneliners 😉 wget “https://github.com/diego-treitos/linux-smart-enumeration/releases/latest/download/lse.sh” -O lse.sh;chmod 700 lse.sh curl “https://github.com/diego-treitos/linux-smart-enumeration/releases/latest/download/lse.sh” -Lo lse.sh;chmod 700 lse.sh Note …
289
Downloads, eBPF, Hacking Tools, Privilege Escalation, Real-Time, Rootkit, Virtual MachineVED (Vault Exploit Defense)-eBPF leverages eBPF (extended Berkeley Packet Filter) to implement runtime kernel security monitoring and exploit detection for …
274
Downloads, Hacking Tools, Privilege Escalation, Remote, Rootkit, SSHA Linux persistence tool! A powerful and versatile Linux persistence script designed for various security assessment and testing scenarios. This …
326
Downloads, Hacking Tools, Privilege Escalation, WindowsBased on the history of Potato privilege escalation for 6 years, from the beginning of RottenPotato to the end of …
423
Downloads, Hacking Tools, Privilege Escalation, Python, Registry, Registry Key, WindowsPXEThief is a set of tooling that implements attack paths discussed at the DEF CON 30 talk Pulling Passwords out …
402
Downloads, Hacking Tools, Neo4J, Node, Privesc, Privilege, Privilege Escalation, Python, Python Packageautobloody is a tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound. Description This tool automates the …
524
Downloads, Hacking Tools, Infosectools, Privilege Escalation, Redteam ToolsA standalone python3 remake of the classic “tree” command with the additional feature of searching for user provided keywords/regex in …
449
Downloads, Hacking Tools, NTLM, Privilege Escalation, WindowsA python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 9 methods. Features Automatically …
502
Downloads, Hacking Tools, Kerberos, LDAP, Logging, Privilege Escalation, Python3, SMBAced is a tool to parse and resolve a single targeted Active Directory principal’s DACL. Aced will identify interesting inbound …
493
Downloads, Hacking Tools, Kerberos, NTLM, Privilege, Privilege Escalation, VulnerableThis tool is designed to aid an operator in modifying ADCS certificate templates so that a created vulnerable state can …
477