This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft
☆25May 5, 2022Updated 3 years ago
Alternatives and similar repositories for nimbuspwn
Users that are interested in nimbuspwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆64Apr 28, 2022Updated 3 years ago
- ☆13Jun 30, 2017Updated 8 years ago
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago
- glibc getcwd() local privilege escalation compiled binaries☆32Feb 9, 2018Updated 8 years ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆41May 14, 2022Updated 3 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Sep 29, 2022Updated 3 years ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- Another AMSI bypass - but in C++.☆25May 22, 2023Updated 2 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- CVE-2022-2602☆86Dec 22, 2022Updated 3 years ago
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆21Dec 15, 2024Updated last year
- ☆14Sep 8, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container☆15Dec 16, 2017Updated 8 years ago
- CVE-2022-25636 exploit rewritten with pipe primitive☆20Apr 5, 2022Updated 3 years ago
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- CVE-2022-0185 exploit rewritten with pipe primitive☆17Apr 5, 2022Updated 3 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated 2 years ago
- malware written for educational purposes☆72Dec 31, 2025Updated 2 months ago
- PoC for CVE-2022-1388_F5_BIG-IP☆58May 15, 2022Updated 3 years ago
- Automated SUID Privilege Escalation Checker☆19Oct 15, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Confluence Hardcoded Password POC☆15Jul 30, 2022Updated 3 years ago
- Protect domains from malicious browser extensions☆17Apr 16, 2025Updated 11 months ago
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆34Jun 9, 2023Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Jun 22, 2024Updated last year
- Hooked create process injection for meterpreter☆23Jun 16, 2021Updated 4 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- 💀 Linux local root exploit for CVE-2018-18955☆22Jan 20, 2022Updated 4 years ago