Frichetten / CVE-2019-5736-PoC
PoC for CVE-2019-5736
☆639Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2019-5736-PoC
- Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)☆207Updated 5 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆662Updated 5 years ago
- Some of my exploits.☆572Updated 3 years ago
- PoC for Dirty COW (CVE-2016-5195)☆491Updated 2 years ago
- There is no pre-auth RCE in Jenkins since May 2017, but this is the one!☆603Updated 5 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆699Updated 5 years ago
- Exploit written in Python for CVE-2018-15473 with threading and export formats☆521Updated 3 months ago
- ☆235Updated 5 years ago
- Tool for extracting information from newly spawned processes☆734Updated 2 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,056Updated 2 years ago
- Linux 4.10 < 5.1.17 PTRACE_TRACEME local root☆326Updated 5 years ago
- Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (…☆310Updated 5 years ago
- 🔪Browser logic vulnerabilities☆688Updated 3 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆974Updated 3 years ago
- A CVE-2016-5195 exploit example.☆314Updated 7 years ago
- Various kernel exploits☆745Updated 7 months ago
- TCP tunneling over HTTP/HTTPS for web application servers☆727Updated 8 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆496Updated 10 months ago
- A collection of curated Java Deserialization Exploits☆590Updated 3 years ago
- SHELLING - a comprehensive OS command injection payload generator☆438Updated 4 years ago
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆491Updated 2 years ago
- Java RMI enumeration and attack tool.☆715Updated 7 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆573Updated 3 years ago
- Vulnerability Labs for security analysis☆1,158Updated 3 years ago
- ☆465Updated last year
- My proof-of-concept exploits for the Linux kernel☆1,449Updated 2 years ago
- Simple reverse ICMP shell☆1,559Updated 6 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆344Updated 3 years ago
- Rogue MySql Server☆467Updated 11 years ago