Notselwyn / CVE-2024-1086Links
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
☆2,374Updated last year
Alternatives and similar repositories for CVE-2024-1086
Users that are interested in CVE-2024-1086 are comparing it to the libraries listed below
Sorting:
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆845Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,088Updated 11 months ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆729Updated last year
- The Network Execution Tool☆4,337Updated this week
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,572Updated last month
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆671Updated 9 months ago
- PoC for CVE-2023-4911☆389Updated last year
- a signal handler race condition in OpenSSH's server (sshd)☆476Updated 11 months ago
- Navigate the CVE jungle with ease.☆2,029Updated last week
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,867Updated last year
- Monitor linux processes without root permissions☆5,499Updated 2 years ago
- Windows Local Privilege Escalation Cookbook☆1,129Updated 5 months ago
- Various *nix tools built as statically-linked binaries☆3,384Updated last year
- ☆1,986Updated last year
- Differential testing framework for HTTP implementations☆833Updated last month
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆849Updated 3 months ago
- SSH based reverse shell☆1,133Updated last month
- CVE-2023-38831 winrar exploit generator☆786Updated last year
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,330Updated 2 weeks ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,247Updated 6 months ago
- A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.☆613Updated 2 years ago
- Penelope Shell Handler☆948Updated 2 weeks ago
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,612Updated this week
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,522Updated last year
- ☆694Updated last year
- RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust 🦀☆1,641Updated this week
- Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023]☆511Updated last year
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,262Updated 5 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,440Updated last week
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,001Updated this week