Linux privilege escalation exploits collection.
☆179Apr 26, 2023Updated 3 years ago
Alternatives and similar repositories for Linux-Privilege-Escalation-Exploits
Users that are interested in Linux-Privilege-Escalation-Exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SPIP BigUp Plugin Unauthenticated RCE☆16Sep 7, 2024Updated last year
- A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.☆711May 20, 2023Updated 2 years ago
- ☆199Jan 12, 2026Updated 3 months ago
- I am still working on it☆11Apr 30, 2020Updated 6 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆139Aug 20, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Script to setup pwn environment with Docker☆49Jan 10, 2026Updated 3 months ago
- ☆16Apr 12, 2023Updated 3 years ago
- Active Directory Certificate Services (ADCS) enumeration library with BloodHound CE v6 export support☆77Apr 26, 2026Updated last week
- ☆14Sep 4, 2025Updated 8 months ago
- A tool designed to detect the vulnerability **CVE-2025-31650** in Apache Tomcat (versions 10.1.10 to 10.1.39)☆20Apr 30, 2025Updated last year
- ☆299Jan 7, 2015Updated 11 years ago
- A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)☆326Sep 19, 2022Updated 3 years ago
- This repository contain recurring IoT vulnerabilities found by FirmRec.☆17Aug 25, 2023Updated 2 years ago
- exploit for cve-2025-43529☆77Jan 5, 2026Updated 4 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- AppXSVC Service race condition - privilege escalation☆30Jul 30, 2019Updated 6 years ago
- Symbolic execution engine for Whitespace.☆14May 30, 2021Updated 4 years ago
- ☆20Sep 15, 2023Updated 2 years ago
- ☆22Apr 30, 2023Updated 3 years ago
- Academic research rootkit using ftrace-hooking to hide files and processes via magic word or user/group. Tested until Linux 6.11.☆47Jun 5, 2025Updated 11 months ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- Community documentation for known Hack The Box v4 API endpoints☆26Oct 6, 2022Updated 3 years ago
- Tomcat的Filter型免杀内存马,主要思路是Bypass各种检查手段☆10Nov 26, 2021Updated 4 years ago
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆494May 16, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CVE-2023-2255 Libre Office☆64Jul 10, 2023Updated 2 years ago
- Smart Setup Server For BugBounty☆26Aug 21, 2023Updated 2 years ago
- Proof of concept for Kerberos Armoring abuse.☆83Dec 12, 2025Updated 4 months ago
- Peripheral Transplantation to Rehost Embedded Linux kernels☆16Mar 6, 2022Updated 4 years ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆689Oct 23, 2025Updated 6 months ago
- Ultra-fast SNMPv1/v2 stack. Get/set/walk tens of thousands of hosts at once.☆90Sep 8, 2024Updated last year
- Exploit scripts for ctf challenges that involves linux kernel pwning☆18Dec 10, 2024Updated last year
- ☆29Oct 15, 2023Updated 2 years ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆234Feb 20, 2020Updated 6 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- privilege escalation by piggy-backing user sudo requests☆16Feb 6, 2023Updated 3 years ago
- Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)☆15Nov 21, 2022Updated 3 years ago
- Root shell PoC for CVE-2021-3156☆71Feb 3, 2021Updated 5 years ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,522Feb 15, 2026Updated 2 months ago
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆161Jun 24, 2024Updated last year