JlSakuya / Linux-Privilege-Escalation-Exploits
Linux privilege escalation exploits collection.
☆126Updated 2 years ago
Alternatives and similar repositories for Linux-Privilege-Escalation-Exploits
Users that are interested in Linux-Privilege-Escalation-Exploits are comparing it to the libraries listed below
Sorting:
- GameOver(lay) Ubuntu Privilege Escalation☆124Updated last year
- POC for CVE-2021-41091☆65Updated last year
- Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.☆214Updated 7 months ago
- Vulnerabilities Exploitation On Ubuntu 22.04☆41Updated 2 years ago
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆107Updated 8 months ago
- A script to automate privilege escalation with CVE-2023-22809 vulnerability☆155Updated 2 years ago
- A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)☆315Updated 2 years ago
- POC exploit for CVE-2024-49138☆249Updated 3 months ago
- SSTI Payload Generator☆90Updated 2 years ago
- This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.☆73Updated last year
- CVE-2023-0386在ubuntu22.04上的提权☆394Updated last year
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆335Updated last year
- Official writeups for Business CTF 2024: The Vault Of Hope☆146Updated 5 months ago
- A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read☆215Updated last month
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆146Updated 2 months ago
- CVE-2023-32233: Linux内核中的安全漏洞☆371Updated 2 years ago
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆116Updated 2 months ago
- Machines, Sherlocks, Challenges, Season III,IV☆13Updated last year
- Interact with Hackthebox using your terminal - Be faster and more competitive !☆118Updated last month
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆384Updated 8 months ago
- CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request …☆279Updated 8 months ago
- Root shell PoC for CVE-2021-3156☆66Updated 4 years ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆124Updated last year
- Official writeups for Cyber Apocalypse CTF 2024: Hacker Royale☆202Updated 5 months ago
- CVE-2023-2255 Libre Office☆58Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆374Updated 4 months ago
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆139Updated 10 months ago
- All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs☆41Updated 2 years ago
- Ad hoc collection of Red Teaming & Active Directory tooling.☆201Updated last year
- ☆815Updated 2 years ago