CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability
☆21Mar 8, 2022Updated 4 years ago
Alternatives and similar repositories for CVE_2022_0847
Users that are interested in CVE_2022_0847 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆19May 19, 2023Updated 2 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- Steam, Dota, CSGO, PUBG Scam Site☆11Jan 23, 2022Updated 4 years ago
- ☆12Oct 7, 2020Updated 5 years ago
- a windows kernel keylogger that works☆20Feb 12, 2024Updated 2 years ago
- A Safer PoC for CVE-2022-22965 (Spring4Shell)☆44May 27, 2022Updated 3 years ago
- Command line tool to fetch, decode and brute-force CodeIgniter session cookies by guessing and bruteforcing secret keys.☆16Jan 31, 2025Updated last year
- A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.☆25Dec 4, 2020Updated 5 years ago
- Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847.☆58Mar 8, 2022Updated 4 years ago
- Bash script to generate reverse shell payloads☆19Sep 9, 2023Updated 2 years ago
- Squid and Stunnel assembled as a proxy server☆12Mar 2, 2017Updated 9 years ago
- A library for peer discovery inside the Tor network☆27Apr 19, 2024Updated last year
- A javascript based botnet/C&C to remotely manage/control browsers.☆24Feb 4, 2022Updated 4 years ago
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆18Mar 19, 2025Updated last year
- HTTP Botnet in C, Cross Compilable. (Layer 7 - Layer 4) - 11 Methods☆33Aug 4, 2022Updated 3 years ago
- A tiny GitHub searcher using the GitHub API. No authentication required.☆13Mar 4, 2026Updated 2 weeks ago
- ☆16Jun 23, 2024Updated last year
- NSE script to detect ProxyOracle☆13Aug 30, 2021Updated 4 years ago
- This project introduce about make your self 3G/4G/LTE proxies, build your self mobiles proxies☆24Aug 19, 2022Updated 3 years ago
- POC about how to prevent windbg break☆15Oct 3, 2022Updated 3 years ago
- Netcat for windows.☆21Sep 23, 2018Updated 7 years ago
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- ☆29Jan 27, 2026Updated last month
- A tool to check TCP connections.☆15Jun 20, 2025Updated 9 months ago
- ☆10Apr 2, 2022Updated 3 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- This is a repository where I do fun things with python☆13Feb 12, 2024Updated 2 years ago
- ☆28Dec 2, 2021Updated 4 years ago
- Ghidra analyzer for UEFI firmware.☆18Jun 24, 2023Updated 2 years ago
- wordpress batch brute force☆11Sep 21, 2021Updated 4 years ago
- Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773☆113Mar 12, 2022Updated 4 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- Light-weight, cross-platform (NET Core 2.1) C# Asynchronous file server and text messaging platform. Utilizes custom extension methods wh…☆12Mar 28, 2019Updated 6 years ago
- windows内核安全与驱动开发代码☆12Apr 4, 2020Updated 5 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated 2 months ago
- AIRecon is an autonomous cybersecurity agent that combines a self-hosted Large Language Model (Ollama) with a Kali Linux Docker sandbox a…☆96Updated this week
- Ro3b - Advance Banking HTTP Botnet☆50Jun 12, 2023Updated 2 years ago
- HTTP botnet☆63Jul 30, 2016Updated 9 years ago
- It is a example of Spring Boot Opencv to crop pdf files matching to data☆11Aug 23, 2018Updated 7 years ago