Example of passing file descriptors into a container to perform a privilege escalation on the host
☆24Jul 3, 2020Updated 5 years ago
Alternatives and similar repositories for fdpasser
Users that are interested in fdpasser are comparing it to the libraries listed below
Sorting:
- ☆18Jul 30, 2018Updated 7 years ago
- CVE-2019-0708 Exploit Tool☆18Jul 18, 2019Updated 6 years ago
- This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft☆25May 5, 2022Updated 3 years ago
- 非付费会员,fofa数据无限抓取版☆24Mar 6, 2025Updated 11 months ago
- ☆33Nov 14, 2025Updated 3 months ago
- ☆13Aug 5, 2025Updated 6 months ago
- Go语言,不允许import,请开始你的表演☆62Aug 6, 2022Updated 3 years ago
- ☆38Oct 26, 2021Updated 4 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆15Jan 17, 2026Updated last month
- C# SDK for SecureAuth IdP API☆11May 31, 2023Updated 2 years ago
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆91May 3, 2018Updated 7 years ago
- WinDbg plugin to trace module transitions from a debugged driver.☆40Dec 22, 2025Updated 2 months ago
- cve-2022-34169 延伸出的Jdk Xalan的payload自动生成工具,可根据不同的Jdk生成出其所对应的xslt文件☆93Jan 17, 2023Updated 3 years ago
- Tracking Google Enterprise Android Devices☆21Feb 20, 2026Updated last week
- A toolkit to unpack, debug and repack an rpk file.☆12Jan 27, 2021Updated 5 years ago
- CDB-PIg is a plugin for cdb, but not windbg.☆11Nov 29, 2018Updated 7 years ago
- Convert OpenVPN profiles to an APC file that can be imported into a Sophos/Astaro UTM☆14Nov 16, 2015Updated 10 years ago
- Polymorphic Virus in Python☆10Feb 8, 2023Updated 3 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 7 months ago
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 7 months ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- User-Defined C2 BOF Template☆28Nov 24, 2025Updated 3 months ago
- Docker based Bugzilla development environment☆11Nov 1, 2016Updated 9 years ago
- Magic Mirror module - Display public transport in Stockholm/Sweden.☆11Feb 23, 2024Updated 2 years ago
- A reverse/bind shell generator utility☆11Jul 22, 2024Updated last year
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Take a QEMU binary, copy the dependencies into a chroot☆11Oct 5, 2022Updated 3 years ago
- Pure Go rewrite of knockknock☆11Feb 7, 2023Updated 3 years ago
- Python extension for the GNU project debugger (GDB)☆13Mar 6, 2020Updated 5 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Jul 10, 2019Updated 6 years ago
- New Tool To Unlock Hc Files Decryptor for HTTP Custom configuration files (LAPSCA)☆14Feb 16, 2023Updated 3 years ago
- w4b-file : WebFile Analyzer is an advanced command-line utility meticulously crafted for web developers, security professionals, and rese…☆11Nov 16, 2023Updated 2 years ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- SmartThings DTH for toggling the motion sensor setting on SmartCams.☆15Sep 26, 2017Updated 8 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Burp extension for processing requests and responses with Python.☆10Jun 19, 2018Updated 7 years ago