Frichetten / CVE-2019-5736-PoCLinks
PoC for CVE-2019-5736
☆655Updated 3 years ago
Alternatives and similar repositories for CVE-2019-5736-PoC
Users that are interested in CVE-2019-5736-PoC are comparing it to the libraries listed below
Sorting:
- Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)☆207Updated 6 years ago
- PoC for Dirty COW (CVE-2016-5195)☆506Updated 3 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆682Updated 6 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,081Updated 3 years ago
- There is no pre-auth RCE in Jenkins since May 2017, but this is the one!☆605Updated 6 years ago
- Some of my exploits.☆597Updated 4 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆729Updated 6 years ago
- Linux 4.10 < 5.1.17 PTRACE_TRACEME local root☆328Updated 6 years ago
- Various kernel exploits☆798Updated last year
- ☆232Updated 6 years ago
- A CVE-2016-5195 exploit example.☆329Updated 8 years ago
- Exploit written in Python for CVE-2018-15473 with threading and export formats☆531Updated last year
- Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (…☆316Updated 6 years ago
- Apache Solr Injection Research☆581Updated 5 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆818Updated 2 years ago
- dump☆497Updated 6 years ago
- SHELLING - a comprehensive OS command injection payload generator☆444Updated 5 years ago
- Java RMI enumeration and attack tool.☆741Updated 8 years ago
- PoC for triggering buffer overflow via CVE-2020-0796☆330Updated 2 years ago
- ☆476Updated 2 years ago
- Tool for extracting information from newly spawned processes☆774Updated 7 months ago
- Rogue MySql Server☆473Updated 12 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆583Updated 4 years ago
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆517Updated 3 years ago
- Proof of concept for CVE-2019-0708☆1,184Updated 4 years ago
- Vulnerability Labs for security analysis☆1,174Updated 4 years ago
- MySQL fake server for read files of connected clients☆606Updated 8 years ago
- Scanner for CVE-2020-0796 - SMBv3 RCE☆708Updated 5 years ago
- Multi-language web CGI interfaces exploits.☆397Updated 3 years ago
- ☆145Updated 5 years ago