ahrixia / CVE_2022_0847
CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability
☆22Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE_2022_0847
- Bash script to generate reverse shell payloads☆20Updated last year
- Classic Web shell upload techniques & Web RCE techniques☆24Updated 2 weeks ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 2 years ago
- ☆21Updated last year
- This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft☆22Updated 2 years ago
- ☆11Updated 2 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated 10 months ago
- ASPX Shellcode Ceasar Encrypted Generator is a Python script automating shellcode generation, embedding, encryption, and execution in an …☆11Updated last year
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆23Updated 2 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆22Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- NSE script to detect ProxyOracle☆14Updated 3 years ago
- Simple recon tool automates your recon process☆16Updated last year
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆14Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Automate Auxiliary Module in Metasploit☆20Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆53Updated 2 years ago
- A python approach to interacting with web shells.☆29Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- Generate image payloads in JS to bypass filters☆39Updated 3 years ago