YuriiCrimson / ExploitGSMLinks
Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5
☆848Updated last year
Alternatives and similar repositories for ExploitGSM
Users that are interested in ExploitGSM are comparing it to the libraries listed below
Sorting:
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,420Updated last year
- PoC for CVE-2023-4911☆386Updated 2 years ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆752Updated last year
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆685Updated last year
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆490Updated 2 years ago
- a signal handler race condition in OpenSSH's server (sshd)☆490Updated last year
- Kernel exploitation technique☆579Updated 2 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆877Updated 8 months ago
- 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc☆384Updated last year
- I-SOON/Anxun leak related stuff☆327Updated last year
- Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463☆491Updated 3 weeks ago
- Red-Team LKM☆618Updated last month
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,289Updated 4 months ago
- Exploit PoC for CVE-2024-32002☆530Updated last year
- MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc☆123Updated last year
- ☆717Updated last year
- The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,771Updated 2 months ago
- exploit for CVE-2022-2588☆485Updated 2 years ago
- ☆315Updated last year
- CVE-2023-4911 proof of concept☆169Updated 2 years ago
- Complete list of LPE exploits for Windows (starting from 2023)☆847Updated 2 weeks ago
- Android 14 kernel exploit for Pixel7/8 Pro☆525Updated last year
- CVE-2023-38831 winrar exploit generator☆788Updated 2 years ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆176Updated 4 months ago
- A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.☆657Updated 2 years ago
- Powerful RSA cracker for CTFs. Supports RSA, X509, OPENSSH, PKCS#12, PKCS#7, and CSR in PEM and DER formats.☆135Updated this week
- PoC for CVE-2024-48990☆105Updated last year
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,535Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆277Updated last week
- A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)☆322Updated 3 years ago