SecWiki / linux-kernel-exploitsLinks
linux-kernel-exploits Linux平台提权漏洞集合
☆5,430Updated 4 years ago
Alternatives and similar repositories for linux-kernel-exploits
Users that are interested in linux-kernel-exploits are comparing it to the libraries listed below
Sorting:
- windows-kernel-exploits Windows平台提权漏洞集合☆8,329Updated 3 years ago
- ✍️ A curated list of CVE PoCs.☆3,409Updated 3 years ago
- Linux privilege escalation auditing tool☆5,972Updated last year
- Collection of quality safety articles. Awesome articles.☆2,058Updated 8 months ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,069Updated 2 years ago
- Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability detai…☆3,015Updated 2 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,874Updated 4 years ago
- pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.☆3,723Updated 3 months ago
- List of Awesome CobaltStrike Resources☆4,169Updated last year
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,942Updated last year
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,090Updated 3 months ago
- Collection of CTF Web challenges I made☆2,733Updated last year
- LKM Linux rootkit☆2,733Updated 4 years ago
- MS17-010☆2,191Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,232Updated last year
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,383Updated last year
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,095Updated 2 years ago
- A tool to dump the login password from the current linux user☆3,957Updated 2 years ago
- Venom - A Multi-hop Proxy for Penetration Testers☆2,096Updated 3 years ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,537Updated last year
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,802Updated 3 years ago
- A swiss army knife for pentesting networks☆8,746Updated last year
- Linux Exploit Suggester; based on operating system release number☆1,792Updated 11 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,278Updated last year
- Next-Generation Linux Kernel Exploit Suggester☆1,913Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,241Updated last year
- Windows Exploit Suggester - Next Generation☆4,446Updated last week
- Monitor linux processes without root permissions☆5,460Updated 2 years ago
- 快速搭建各种漏洞环境(Various vulnerability environment)☆3,751Updated 4 years ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,219Updated 2 months ago