Dump remote files through a local file read or Local File Inclusion web vulnerability.
Unprivileged Linux process snooping.
Automatic Linux privilege escalation via exploitation of low-hanging fruit.
A (partial) Python rewriting of PowerSploit's PowerView.
Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
Unix binaries that can be manipulated for argument injection.
Standalone script to enumerate SUID binaries, separate default binaries from customs.
Shell script to check for simple privilege escalation vectors on Unix systems.
A Linux privilege escalation check script.
Hacking tools installer and package manager for hackers.
Based on operating system release number.
Automates a number of Active Directory enumeration and vulnerability.
Privilege Escalation Awesome Scripts SUITE.
Scripted Local Linux Enumeration & Privilege Escalation Checks.
The security analyzer for firmware of embedded devices.