YuriiCrimson / ExploitGSM
Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5
☆844Updated last year
Alternatives and similar repositories for ExploitGSM
Users that are interested in ExploitGSM are comparing it to the libraries listed below
Sorting:
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,360Updated last year
- PoC for CVE-2023-4911☆385Updated last year
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆726Updated last year
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆477Updated last year
- a signal handler race condition in OpenSSH's server (sshd)☆477Updated 10 months ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,081Updated 9 months ago
- Android 14 kernel exploit for Pixel7/8 Pro☆497Updated last year
- ☆689Updated 10 months ago
- ☆313Updated last year
- Complete list of LPE exploits for Windows (starting from 2023)☆785Updated 2 weeks ago
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆663Updated 8 months ago
- Differential testing framework for HTTP implementations☆826Updated last week
- MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc☆122Updated 9 months ago
- I-SOON/Anxun leak related stuff☆309Updated last year
- CVE-2023-4911 proof of concept☆168Updated last year
- Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.☆292Updated last year
- CVE-2023-38831 winrar exploit generator☆788Updated last year
- CVE-2023-32233: Linux内核中的安全漏洞☆371Updated last year
- LPE exploit for CVE-2023-21768☆486Updated last year
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆839Updated last month
- exploit for CVE-2022-2588☆483Updated 2 years ago
- ☆344Updated last year
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆351Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆255Updated this week
- Red-Team Linux kernel rootkit☆405Updated 3 weeks ago
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆1,953Updated 11 months ago
- An even funnier way to disable windows defender. (through WSC api)☆507Updated this week
- basic concept for the latest windows wifi driver CVE☆235Updated 6 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,185Updated 5 months ago
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,512Updated last year