Link to this headingLinux
Linux Kernel Module Rootkit
How Htop works
Linux Exploit Suggester
Gathers info about local system, users, and domain information stealthy
Linux Post Exploitation techniques will ensure that we maintain some level of access and can potentially lead to deeper footholds into our targets trusted network.
Link to this headingPrivilege Escalation
Linux kernel privilege escalation enumeration and exploitation framework
Vulnerability scanner for Linux/FreeBSD
Local Linux Enumeration & Privilege Escalation Checks
Link to this headingBuilt in SUID Binaries
Privilege Escalation binaries
Find SUID binaries and auto exploit them