Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
☆2,441Apr 17, 2024Updated 2 years ago
Alternatives and similar repositories for CVE-2024-1086
Users that are interested in CVE-2024-1086 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.☆319Apr 16, 2024Updated 2 years ago
- ☆2,227Nov 24, 2023Updated 2 years ago
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆852Apr 19, 2024Updated 2 years ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆216May 9, 2024Updated last year
- LPE exploit for CVE-2024-0582 (io_uring)☆102Mar 29, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆288Jul 31, 2024Updated last year
- The Havoc Framework☆8,274Dec 18, 2025Updated 4 months ago
- ☆706Nov 7, 2023Updated 2 years ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,433Apr 9, 2026Updated last week
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,556Apr 3, 2024Updated 2 years ago
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆692Aug 27, 2024Updated last year
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆763Feb 19, 2024Updated 2 years ago
- Android 14 kernel exploit for Pixel7/8 Pro☆547Apr 23, 2024Updated last year
- Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()☆505Sep 30, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆622Jan 2, 2025Updated last year
- New generation of wmiexec.py☆1,279Mar 24, 2026Updated 3 weeks ago
- The Network Execution Tool☆5,407Apr 6, 2026Updated last week
- exploit for CVE-2022-2588☆488Mar 4, 2023Updated 3 years ago
- Fileless atexec, no more need for port 445☆405Mar 28, 2024Updated 2 years ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆589Mar 19, 2024Updated 2 years ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,288Jan 29, 2026Updated 2 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,849Nov 3, 2024Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆639May 8, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PoC for CVE-2023-4911☆388Oct 4, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,197Oct 16, 2023Updated 2 years ago
- CVE-2023-32233: Linux内核中的安全漏洞☆374May 16, 2023Updated 2 years ago
- HVNC for Cobalt Strike☆1,317Dec 7, 2023Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆869Feb 3, 2024Updated 2 years ago
- Adversary Emulation Framework☆10,986Apr 10, 2026Updated last week
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆2,043Jun 8, 2024Updated last year
- UAC Bypass By Abusing Kerberos Tickets☆507Aug 10, 2023Updated 2 years ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,459Feb 15, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Process injection alternative☆407Sep 6, 2024Updated last year
- Dominate Active Directory with PowerShell.☆1,174Nov 28, 2025Updated 4 months ago
- Windows remote execution multitool☆789Mar 25, 2026Updated 3 weeks ago
- CVE-2023-0386在ubuntu22.04上的提权☆416Jun 13, 2023Updated 2 years ago
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆498Feb 23, 2026Updated last month
- Windows Local Privilege Escalation Cookbook☆1,300Feb 5, 2026Updated 2 months ago
- ☆216Mar 29, 2024Updated 2 years ago