JlSakuya / Linux-Privilege-Escalation-Exploits
Linux privilege escalation exploits collection.
☆114Updated last year
Alternatives and similar repositories for Linux-Privilege-Escalation-Exploits:
Users that are interested in Linux-Privilege-Escalation-Exploits are comparing it to the libraries listed below
- GameOver(lay) Ubuntu Privilege Escalation☆123Updated last year
- A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read☆213Updated 2 years ago
- CVE-2023-0386在ubuntu22.04上的提权☆388Updated last year
- POC for CVE-2021-41091☆65Updated last year
- CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator☆272Updated 2 years ago
- A script to automate privilege escalation with CVE-2023-22809 vulnerability☆153Updated 2 years ago
- CVE-2023-32233: Linux内核中的安全漏洞☆371Updated last year
- CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request …☆276Updated 5 months ago
- POC exploit for CVE-2024-49138☆234Updated 3 weeks ago
- A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)☆308Updated 2 years ago
- ImageMagick LFI PoC [CVE-2022-44268]☆52Updated last year
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆368Updated 5 months ago
- Collection of Windows Privilege Escalation (Analyse/PoC/Exploit)☆359Updated 2 months ago
- Vulnerabilities Exploitation On Ubuntu 22.04☆38Updated last year
- This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.☆73Updated 10 months ago
- out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability☆132Updated 11 months ago
- All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs☆37Updated 2 years ago
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆85Updated 5 months ago
- ☆302Updated this week
- Enumerate / Dump Docker Registry☆167Updated 10 months ago
- exploit for f5-big-ip RCE cve-2023-46747☆204Updated 3 months ago
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆290Updated 8 months ago
- CVEs and Techniques used PDF as an attack vector.☆77Updated 2 years ago
- SSTI Payload Generator☆89Updated 2 years ago
- Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.☆202Updated 4 months ago
- Styx is an cross-platform GUI interface for HackTheBox made in GoLang☆23Updated 6 months ago
- PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC☆249Updated 7 months ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆122Updated 5 years ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆117Updated last year
- This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220☆23Updated 6 months ago