Notselwyn / CVE-2024-1086
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
☆2,325Updated 9 months ago
Alternatives and similar repositories for CVE-2024-1086:
Users that are interested in CVE-2024-1086 are comparing it to the libraries listed below
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆843Updated 8 months ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,006Updated 5 months ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆708Updated 10 months ago
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆642Updated 4 months ago
- Navigate the CVE jungle with ease.☆1,822Updated last week
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,504Updated 9 months ago
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,510Updated 3 weeks ago
- The Network Execution Tool☆3,487Updated this week
- a signal handler race condition in OpenSSH's server (sshd)☆473Updated 6 months ago
- The Havoc Framework☆7,085Updated this week
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,095Updated 5 months ago
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆468Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,049Updated 2 weeks ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,100Updated last month
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,194Updated 5 months ago
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,092Updated 2 years ago
- ☆1,861Updated last year
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,294Updated last month
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆961Updated last month
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆3,880Updated 2 months ago
- PoC for CVE-2023-4911☆383Updated last year
- 🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust☆1,362Updated last month
- ☆736Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆2,584Updated last month
- SSH based reverse shell☆1,018Updated 3 weeks ago
- Complete list of LPE exploits for Windows (starting from 2023)☆692Updated this week
- Adversary Emulation Framework☆8,782Updated this week
- ☆657Updated 6 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,147Updated 2 months ago
- Automated decoding of encrypted text without knowing the key or ciphers used☆595Updated 8 months ago