YuriiCrimson / ExploitGSMLinks
Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5
☆847Updated last year
Alternatives and similar repositories for ExploitGSM
Users that are interested in ExploitGSM are comparing it to the libraries listed below
Sorting:
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,428Updated last year
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆754Updated last year
- PoC for CVE-2023-4911☆388Updated 2 years ago
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆685Updated last year
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆490Updated 2 years ago
- a signal handler race condition in OpenSSH's server (sshd)☆491Updated last year
- ☆716Updated last year
- MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc☆124Updated last year
- 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc☆386Updated last year
- Red-Team LKM☆626Updated 3 weeks ago
- ☆318Updated 2 years ago
- Exploit PoC for CVE-2024-32002☆532Updated last year
- Kernel exploitation technique☆581Updated 2 years ago
- Complete list of LPE exploits for Windows (starting from 2023)☆895Updated 2 weeks ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,298Updated 5 months ago
- Android 14 kernel exploit for Pixel7/8 Pro☆531Updated last year
- I-SOON/Anxun leak related stuff☆329Updated last year
- CVE-2023-4911 proof of concept☆169Updated 2 years ago
- A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)☆322Updated 3 years ago
- CVE-2023-38831 winrar exploit generator☆789Updated 2 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆878Updated 9 months ago
- Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463☆506Updated last month
- 🤖🏴☠️ radare2 plugin for GPT-4 🦜. Solve crackmes automatically 🪄☆279Updated last year
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,532Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆290Updated last month
- Differential testing framework for HTTP implementations☆920Updated last month
- PasteBomb C2-less RAT☆319Updated 3 months ago
- ☆233Updated last year
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,274Updated last year
- A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.☆671Updated 2 years ago