| The-Z-Labs/linux-exploit-suggester |
6,434 |
|
0 |
0 |
25 days ago |
0 |
|
19 |
gpl-3.0 |
Shell |
| Linux privilege escalation auditing tool |
| liamg/traitor |
6,329 |
|
0 |
0 |
over 2 years ago |
19 |
March 09, 2022 |
17 |
mit |
Go |
| :arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock |
| edoardottt/awesome-hacker-search-engines |
6,307 |
|
0 |
0 |
about 2 years ago |
0 |
|
10 |
mit |
Shell |
| A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more |
| trickest/cve |
5,806 |
|
0 |
0 |
about 2 years ago |
0 |
|
13 |
mit |
HTML |
| Gather and update all available and newest CVEs with their PoC. |
| NullArray/AutoSploit |
4,858 |
|
0 |
0 |
almost 3 years ago |
0 |
|
43 |
gpl-3.0 |
Python |
| Automated Mass Exploiter |
| k8gege/Ladon |
4,400 |
|
0 |
0 |
over 2 years ago |
8 |
June 05, 2023 |
32 |
mit |
PowerShell |
| Ladon大型内网渗透工具,可PowerShell模块化、可CS插件化、可内存加载,无文件扫描。含端口扫描、服务识别、网络资产探测、密码审计、高危漏洞检测、漏洞利用、密码读取以及一键GetShell,支持批量A段/B段/C段以及跨网段扫描,支持URL、主机、域名列表扫描等。Ladon 12.2内置262个功能,网络资产探测模块32个通过多种协议(ICMP\NBT\DNS\MAC\SMB\WMI\SSH\HTTP\HTTPS\Exchange\mssql\FTP\RDP)以及方法快速获取目标网络存活主机IP、计算机名、工作组、共享资源、网卡地址、操作系统版本、网站、子域名、中间件、开放服务、路由器、交换机、数据库、打印机等信息,高危漏洞检测16个含MS17010、Zimbra、Exchange |
| zhzyker/vulmap |
2,935 |
|
0 |
0 |
almost 3 years ago |
0 |
|
28 |
gpl-3.0 |
Python |
| Vulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞验证功能 |
| codingo/NoSQLMap |
2,603 |
|
0 |
0 |
over 2 years ago |
0 |
|
1 |
gpl-3.0 |
Python |
| Automated NoSQL database enumeration and web application exploitation tool. |
| byt3bl33d3r/SILENTTRINITY |
2,087 |
|
0 |
0 |
over 2 years ago |
0 |
|
47 |
gpl-3.0 |
Boo |
| An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR |
| anouarbensaad/vulnx |
1,763 |
|
0 |
0 |
almost 3 years ago |
2 |
June 04, 2019 |
19 |
gpl-3.0 |
Python |
| vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information collection (including sub-domain name, ip address, country information, organizational information and time zone, etc.) and vulnerability scanning. |