Notselwyn / CVE-2024-1086Links
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
☆2,378Updated last year
Alternatives and similar repositories for CVE-2024-1086
Users that are interested in CVE-2024-1086 are comparing it to the libraries listed below
Sorting:
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆844Updated last year
- a signal handler race condition in OpenSSH's server (sshd)☆477Updated last year
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆730Updated last year
- The Network Execution Tool☆4,411Updated this week
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,098Updated 11 months ago
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆673Updated 10 months ago
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,635Updated last week
- Navigate the CVE jungle with ease.☆2,045Updated this week
- PoC for CVE-2023-4911☆388Updated last year
- SSH based reverse shell☆1,147Updated last month
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,525Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,641Updated last month
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,108Updated 3 years ago
- Exploit PoC for CVE-2024-32002☆531Updated last year
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆853Updated 3 months ago
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆480Updated last year
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆2,023Updated last year
- ☆2,000Updated last year
- A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.☆616Updated 2 years ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,237Updated 11 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,265Updated 7 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,096Updated last week
- CVE-2023-38831 winrar exploit generator☆788Updated last year
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,875Updated last year
- Connect like there is no firewall. Securely.☆1,706Updated last week
- ☆696Updated last year
- MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc☆122Updated 11 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,453Updated 2 years ago
- RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust 🦀☆1,664Updated last week
- Linux/Windows post-exploitation framework made by linux user☆1,590Updated 3 weeks ago