Linux privilege escalation exploits collection.
☆173Apr 26, 2023Updated 2 years ago
Alternatives and similar repositories for Linux-Privilege-Escalation-Exploits
Users that are interested in Linux-Privilege-Escalation-Exploits are comparing it to the libraries listed below
Sorting:
- ☆189Jan 12, 2026Updated last month
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆130Aug 20, 2018Updated 7 years ago
- ☆14Sep 4, 2025Updated 6 months ago
- Community documentation for known Hack The Box v4 API endpoints☆26Oct 6, 2022Updated 3 years ago
- ☆288Jan 7, 2015Updated 11 years ago
- Ant is a post-exploitation tool designed to automate the deployment of tunnels and port forwarding based on a predefined topology configu…☆17Jan 31, 2024Updated 2 years ago
- A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)☆323Sep 19, 2022Updated 3 years ago
- AppXSVC Service race condition - privilege escalation☆30Jul 30, 2019Updated 6 years ago
- Challenges for ImaginaryCTF 2024☆34Sep 5, 2025Updated 6 months ago
- Exploit scripts for ctf challenges that involves linux kernel pwning☆17Dec 10, 2024Updated last year
- Makefiles, and source-codes for my openwrt-useful-tools repo.☆17Apr 29, 2022Updated 3 years ago
- CVE-2023-2255 Libre Office☆64Jul 10, 2023Updated 2 years ago
- privilege escalation by piggy-backing user sudo requests☆16Feb 6, 2023Updated 3 years ago
- Peripheral Transplantation to Rehost Embedded Linux kernels☆16Mar 6, 2022Updated 4 years ago
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆471May 16, 2024Updated last year
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆672Oct 23, 2025Updated 4 months ago
- CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP☆24May 11, 2025Updated 9 months ago
- This repository contain recurring IoT vulnerabilities found by FirmRec.☆17Aug 25, 2023Updated 2 years ago
- Root shell PoC for CVE-2021-3156☆71Feb 3, 2021Updated 5 years ago
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- a minimalistic winrm client written in python☆25May 15, 2025Updated 9 months ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about cybersecurity packet capture (PCAP) tools.☆27Jun 22, 2022Updated 3 years ago
- Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion in Python3☆24Feb 27, 2023Updated 3 years ago
- 💀 Linux local root exploit for CVE-2018-18955☆22Jan 20, 2022Updated 4 years ago
- In this open-source project, we are seeking to implement a two-step verification solution for Leiden University student accounts that is …☆17Aug 13, 2025Updated 6 months ago
- CVE-2022-39227 : Proof of Concept☆22Mar 19, 2024Updated last year
- ☆20Sep 15, 2023Updated 2 years ago
- getsystem via parent process using ps1 & embeded c#☆467Oct 26, 2023Updated 2 years ago
- ☆110Dec 13, 2019Updated 6 years ago
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆50Nov 14, 2023Updated 2 years ago
- ☆28Jul 21, 2025Updated 7 months ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆92Dec 27, 2023Updated 2 years ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆108Jul 22, 2025Updated 7 months ago
- Simple C++ PoC of SeDebugPrivilege Privesc☆30Feb 12, 2024Updated 2 years ago
- ☆23Nov 17, 2024Updated last year
- WhiteWinterWolf's PHP web shell☆761Dec 2, 2017Updated 8 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆429Jul 29, 2013Updated 12 years ago
- ☆164Sep 18, 2025Updated 5 months ago