Notselwyn / CVE-2024-1086
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
☆2,356Updated last year
Alternatives and similar repositories for CVE-2024-1086:
Users that are interested in CVE-2024-1086 are comparing it to the libraries listed below
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆845Updated last year
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆726Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,065Updated 8 months ago
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,512Updated last year
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,576Updated last month
- a signal handler race condition in OpenSSH's server (sshd)☆477Updated 9 months ago
- PoC for CVE-2023-4911☆385Updated last year
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,214Updated 8 months ago
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,099Updated 3 years ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,370Updated this week
- Navigate the CVE jungle with ease.☆1,969Updated this week
- Differential testing framework for HTTP implementations☆816Updated this week
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,838Updated last year
- The Network Execution Tool☆4,056Updated this week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,766Updated 3 weeks ago
- ☆1,936Updated last year
- Gather and update all available and newest CVEs with their PoC.☆6,901Updated this week
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,300Updated 2 months ago
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆6,848Updated this week
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆661Updated 7 months ago
- CVE-2023-38831 winrar exploit generator☆788Updated last year
- Exploit PoC for CVE-2024-32002☆528Updated 11 months ago
- A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.☆595Updated last year
- The Havoc Framework☆7,438Updated 2 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,310Updated 5 months ago
- Monitor linux processes without root permissions☆5,370Updated 2 years ago
- Linux privilege escalation auditing tool☆5,897Updated last year
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆1,907Updated 10 months ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,269Updated last week
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆825Updated last month