YuriiCrimson / ExploitGSMLinks
Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5
☆845Updated last year
Alternatives and similar repositories for ExploitGSM
Users that are interested in ExploitGSM are comparing it to the libraries listed below
Sorting:
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,374Updated last year
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆729Updated last year
- PoC for CVE-2023-4911☆389Updated last year
- a signal handler race condition in OpenSSH's server (sshd)☆476Updated 11 months ago
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆671Updated 9 months ago
- Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023]☆511Updated last year
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆479Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,088Updated 11 months ago
- Differential testing framework for HTTP implementations☆833Updated last month
- Android 14 kernel exploit for Pixel7/8 Pro☆508Updated last year
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,522Updated last year
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆358Updated last year
- ☆694Updated last year
- ☆315Updated last year
- I-SOON/Anxun leak related stuff☆321Updated last year
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆616Updated 7 months ago
- CVE-2023-4911 proof of concept☆168Updated last year
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆849Updated 3 months ago
- CVE-2023-38831 winrar exploit generator☆786Updated last year
- Kernel exploitation technique☆575Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆259Updated 3 weeks ago
- Complete list of LPE exploits for Windows (starting from 2023)☆798Updated last week
- ☆344Updated 2 years ago
- 5G NR Attacks against Qualcomm and Mediatek smartphones. Fuzzer included⚡☆569Updated last week
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆544Updated this week
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆469Updated this week
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆790Updated 2 years ago
- exploit for CVE-2022-2588☆486Updated 2 years ago
- CVE-2023-32233: Linux内核中的安全漏洞☆371Updated 2 years ago
- Linux privilege escalation exploits collection.☆133Updated 2 years ago