JlSakuya / Linux-Privilege-Escalation-ExploitsLinks
Linux privilege escalation exploits collection.
☆171Updated 2 years ago
Alternatives and similar repositories for Linux-Privilege-Escalation-Exploits
Users that are interested in Linux-Privilege-Escalation-Exploits are comparing it to the libraries listed below
Sorting:
- Official writeups for Cyber Apocalypse CTF 2024: Hacker Royale☆217Updated last year
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆165Updated last year
- GameOver(lay) Ubuntu Privilege Escalation☆132Updated 2 years ago
- ☆986Updated 3 years ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆395Updated 10 months ago
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆240Updated 11 months ago
- This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.☆72Updated last year
- A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)☆323Updated 3 years ago
- CTF enumeration tool. It facilitates the Network Pentest☆39Updated last month
- All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs☆54Updated 3 years ago
- Official writeups for Business CTF 2024: The Vault Of Hope☆159Updated last year
- List of payloads: reverse shell, bind shell, webshell.☆62Updated 2 months ago
- Malicious Macro Generator for LibreOffice/OpenOffice☆65Updated 3 years ago
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆183Updated 10 months ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆626Updated last week
- Virtualized WiFi pentesting laboratory without the need for physical Wi-Fi cards, using mac80211_hwsim. Docker version of WiFiChallenge L…☆358Updated this week
- Demonized Shell is an Advanced Tool for persistence in linux.☆432Updated last year
- Simple and accurate guide for linux privilege escalation tactics☆278Updated 2 years ago
- Tips on how to write exploit scripts (faster!)☆543Updated last year
- Interact with Hackthebox using your terminal - Be faster and more competitive !☆140Updated 2 months ago
- Official writeups for University CTF 2023: Brains & Bytes☆105Updated last year
- My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.☆164Updated last month
- Vulnerabilities Exploitation On Ubuntu 22.04☆48Updated 2 years ago
- PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC☆305Updated last year
- Complete list of LPE exploits for Windows (starting from 2023)☆908Updated 3 weeks ago
- A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.☆682Updated 2 years ago
- This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certai…☆446Updated 8 months ago
- Multiplayer pivoting solution☆482Updated 3 months ago
- Most of the notes, resources and scripts I used to prepare for the HTB CPTS and "pass it the 2 time."☆63Updated 2 years ago
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆453Updated last year