Notselwyn / CVE-2024-1086Links
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
☆2,392Updated last year
Alternatives and similar repositories for CVE-2024-1086
Users that are interested in CVE-2024-1086 are comparing it to the libraries listed below
Sorting:
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆844Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,262Updated 2 months ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆740Updated last year
- a signal handler race condition in OpenSSH's server (sshd)☆484Updated last year
- The Network Execution Tool☆4,748Updated last week
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆679Updated last year
- The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,738Updated 2 weeks ago
- SSH based reverse shell☆1,251Updated 2 weeks ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,952Updated 4 months ago
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,528Updated last year
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,110Updated last week
- PoC for CVE-2023-4911☆388Updated 2 years ago
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆486Updated 2 years ago
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,117Updated 3 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆866Updated 6 months ago
- Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463☆452Updated 2 months ago
- ☆2,060Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,599Updated 3 months ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,903Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆2,919Updated 6 months ago
- Exploit PoC for CVE-2024-32002☆528Updated last year
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,338Updated 2 weeks ago
- CVE-2023-38831 winrar exploit generator☆788Updated last year
- A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.☆639Updated 2 years ago
- Tunnel TCP connections through a file☆961Updated last month
- ☆917Updated 2 years ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,335Updated 8 months ago
- Complete list of LPE exploits for Windows (starting from 2023)☆832Updated last month
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,387Updated 7 months ago
- 🚀 Caido releases, wiki and roadmap☆1,797Updated last week