YuriiCrimson / ExploitGSMLinks
Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5
☆843Updated last year
Alternatives and similar repositories for ExploitGSM
Users that are interested in ExploitGSM are comparing it to the libraries listed below
Sorting:
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,396Updated last year
- PoC for CVE-2023-4911☆388Updated 2 years ago
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆485Updated 2 years ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆742Updated last year
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆679Updated last year
- a signal handler race condition in OpenSSH's server (sshd)☆486Updated last year
- ☆711Updated last year
- Exploit PoC for CVE-2024-32002☆528Updated last year
- MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc☆121Updated last year
- 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc☆382Updated last year
- Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463☆473Updated 3 months ago
- Kernel exploitation technique☆578Updated last year
- ☆314Updated last year
- Android 14 kernel exploit for Pixel7/8 Pro☆522Updated last year
- A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)☆321Updated 3 years ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,280Updated 3 months ago
- exploit for CVE-2022-2588☆486Updated 2 years ago
- PoC for CVE-2024-48990☆100Updated 11 months ago
- CVE-2023-4911 proof of concept☆168Updated 2 years ago
- I-SOON/Anxun leak related stuff☆328Updated last year
- Powerful RSA cracker for CTFs. Supports RSA, X509, OPENSSH, PKCS#12, PKCS#7, and CSR in PEM and DER formats.☆129Updated this week
- Red-Team Linux kernel rootkit☆593Updated this week
- 5G NR Attacks against Qualcomm and Mediatek smartphones. Fuzzer included⚡☆602Updated last month
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆868Updated 7 months ago
- CVE-2023-38831 winrar exploit generator☆788Updated last year
- Complete list of LPE exploits for Windows (starting from 2023)☆834Updated 2 months ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆797Updated 3 years ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆269Updated last month
- ☆233Updated last year
- Local Privilege Escalation to Root via Sudo chroot in Linux☆376Updated 3 months ago