JlSakuya / Linux-Privilege-Escalation-ExploitsLinks
Linux privilege escalation exploits collection.
☆133Updated 2 years ago
Alternatives and similar repositories for Linux-Privilege-Escalation-Exploits
Users that are interested in Linux-Privilege-Escalation-Exploits are comparing it to the libraries listed below
Sorting:
- GameOver(lay) Ubuntu Privilege Escalation☆127Updated last year
- Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.☆220Updated 8 months ago
- CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request …☆283Updated 10 months ago
- Enumerate / Dump Docker Registry☆178Updated last year
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆140Updated 3 months ago
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆124Updated 10 months ago
- POC for CVE-2021-41091☆65Updated 2 years ago
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆158Updated 3 months ago
- Official writeups for Cyber Apocalypse CTF 2024: Hacker Royale☆203Updated 6 months ago
- This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.☆74Updated last year
- A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)☆317Updated 2 years ago
- A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read☆216Updated 3 months ago
- Unauthenticated Remote Code Execution – Bricks <= 1.9.6☆168Updated last year
- A Python tool to crack solar putty session backups☆22Updated 6 months ago
- out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability☆135Updated last year
- SSTI Payload Generator☆91Updated 2 years ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆128Updated last year
- All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs☆41Updated 2 years ago
- Vulnerabilities Exploitation On Ubuntu 22.04☆45Updated 2 years ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆308Updated 3 months ago
- This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220☆24Updated 10 months ago
- Official writeups for Business CTF 2024: The Vault Of Hope☆148Updated 6 months ago
- ImageMagick LFI PoC [CVE-2022-44268]☆52Updated last year
- CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator☆271Updated 2 years ago
- POC exploit for CVE-2024-49138☆249Updated 4 months ago
- A comprehensive guide/material for anyone looking to get into infosec or take the OSCP exam☆44Updated 6 years ago
- This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.☆41Updated last year
- A script to automate privilege escalation with CVE-2023-22809 vulnerability☆155Updated 2 years ago
- Machines, Sherlocks, Challenges, Season III,IV☆13Updated last year
- CVE-2023-0386在ubuntu22.04上的提权☆398Updated 2 years ago