ahrixia / CVE_2022_0847Links
CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability
β21Updated 3 years ago
Alternatives and similar repositories for CVE_2022_0847
Users that are interested in CVE_2022_0847 are comparing it to the libraries listed below
Sorting:
- γπͺγLinux Backdoor based on ICMP protocolβ63Updated last year
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strikeβ52Updated 3 years ago
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)β67Updated 3 years ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAVβ27Updated 2 years ago
- This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoftβ25Updated 3 years ago
- CVE-2022-21907 Vulnerability PoCβ30Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β21Updated 3 years ago
- β64Updated 3 years ago
- β10Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!β15Updated 3 years ago
- A python approach to interacting with web shells.β30Updated 5 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives uβ¦β10Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.β40Updated last year
- Polymorphic code obfuscator for use in Red Team operationsβ32Updated 3 years ago
- Enumerate AWS cloud resources based on provided credentialβ51Updated 3 years ago
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646β27Updated 2 years ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.β60Updated last year
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ26Updated 3 years ago
- π» [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)β24Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 3 years ago
- π WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.β27Updated 2 years ago
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube orβ¦β69Updated 4 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocolβ36Updated 4 years ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.β30Updated 4 years ago
- CVE-2023-20198 & 0Day Implant Scannerβ33Updated 2 months ago
- A powerful reverse shell generatorβ46Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagementβ65Updated 3 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keysβ22Updated 4 years ago
- POC FortiOS SSL-VPN buffer overflow vulnerabilityβ27Updated 2 years ago
- PoC for CVE-2021-3129 (Laravel)β12Updated 4 years ago