Notselwyn / CVE-2024-1086
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
☆2,341Updated 9 months ago
Alternatives and similar repositories for CVE-2024-1086:
Users that are interested in CVE-2024-1086 are comparing it to the libraries listed below
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆844Updated 9 months ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,026Updated 6 months ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆725Updated 11 months ago
- a signal handler race condition in OpenSSH's server (sshd)☆475Updated 7 months ago
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,534Updated this week
- The Network Execution Tool☆3,575Updated this week
- Navigate the CVE jungle with ease.☆1,843Updated this week
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆647Updated 5 months ago
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,504Updated 10 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,132Updated last month
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,812Updated 10 months ago
- PoC for CVE-2023-4911☆384Updated last year
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆1,893Updated 8 months ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,199Updated 6 months ago
- ☆1,881Updated last year
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,586Updated 3 months ago
- Monitor linux processes without root permissions☆5,099Updated 2 years ago
- SSH based reverse shell☆1,037Updated 2 weeks ago
- Exploit PoC for CVE-2024-32002☆523Updated 8 months ago
- Gather and update all available and newest CVEs with their PoC.☆6,734Updated this week
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆814Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆2,634Updated last week
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆470Updated last year
- 🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust☆1,413Updated last week
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,745Updated 2 years ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,115Updated 2 months ago
- Six Degrees of Domain Admin☆1,366Updated this week
- Linux/Windows post-exploitation framework made by linux user☆1,485Updated this week
- A Security Tool for Bug Bounty, Pentest and Red Teaming.☆3,666Updated this week
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,906Updated last week