GTFONow
htb-writeups-fetcher
Our great sponsors
GTFONow | htb-writeups-fetcher | |
---|---|---|
1 | 2 | |
491 | 3 | |
- | - | |
6.4 | 10.0 | |
10 days ago | about 1 year ago | |
Python | Python | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
GTFONow
-
Traitor: Linux privilege escalation made easy
How do you plan to use this universally across compromised systems, if they don't have Go to compile this?
A better solution might be https://github.com/Frissi0n/GTFONow which is written in python without dependencies and supports Py2/3. I would expect this to work on more hosts.
htb-writeups-fetcher
What are some alternatives?
Wfetch - Neofetch/pfetch, but for weather
routersploit - Exploitation Framework for Embedded Devices
PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Name-That-Hash - 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes with a neat web app 🔥
pwncat - Fancy reverse and bind shell handler
enum4linux-ng - A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for security professionals and CTF players.
SUID3NUM - A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)
EV1L-J3ST3R - An automated scanning, enumeration, and note taking tool for pentesters
svachal - Automate writeup for vulnerable machines.
haipy - Haipy - Hash Identifier for Python - derived from haiti
PowerHub - A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
traitor - :arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock