JlSakuya / Linux-Privilege-Escalation-ExploitsLinks
Linux privilege escalation exploits collection.
☆151Updated 2 years ago
Alternatives and similar repositories for Linux-Privilege-Escalation-Exploits
Users that are interested in Linux-Privilege-Escalation-Exploits are comparing it to the libraries listed below
Sorting:
- GameOver(lay) Ubuntu Privilege Escalation☆129Updated last year
- Official writeups for Cyber Apocalypse CTF 2024: Hacker Royale☆206Updated 9 months ago
- A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)☆321Updated 2 years ago
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆139Updated last year
- Vulnerabilities Exploitation On Ubuntu 22.04☆47Updated 2 years ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆330Updated 5 months ago
- Official writeups for Business CTF 2024: The Vault Of Hope☆155Updated 9 months ago
- ☆898Updated 2 years ago
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆158Updated 6 months ago
- CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request …☆285Updated last year
- This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.☆74Updated last year
- POC for CVE-2021-41091☆65Updated 2 years ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆403Updated 8 months ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆623Updated 10 months ago
- Tips on how to write exploit scripts (faster!)☆514Updated last year
- Official writeups for University CTF 2023: Brains & Bytes☆104Updated 9 months ago
- Simple and accurate guide for linux privilege escalation tactics☆240Updated last year
- A comprehensive guide/material for anyone looking to get into infosec or take the OSCP exam☆44Updated 6 years ago
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆190Updated 6 months ago
- CTF enumeration tool. It facilitates the Network Pentest☆33Updated last month
- All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs☆47Updated 2 years ago
- PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC☆294Updated last year
- Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.☆226Updated 11 months ago
- Interact with Hackthebox using your terminal - Be faster and more competitive !☆132Updated 5 months ago
- Unauthenticated Remote Code Execution – Bricks <= 1.9.6☆173Updated last year
- Root shell PoC for CVE-2021-3156☆68Updated 4 years ago
- Latest CVEs with their Proof of Concept exploits.☆131Updated this week
- My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.☆137Updated last week
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆404Updated last year
- ☆122Updated 2 years ago