ahrixia / CVE_2022_0847Links
CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability
☆21Updated 3 years ago
Alternatives and similar repositories for CVE_2022_0847
Users that are interested in CVE_2022_0847 are comparing it to the libraries listed below
Sorting:
- ☆64Updated 3 years ago
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)☆70Updated 3 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆21Updated 4 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆53Updated 3 years ago
- Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability☆80Updated 2 years ago
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646☆27Updated 2 years ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆57Updated last year
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆36Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- A powerful reverse shell generator☆45Updated 3 years ago
- CVE-2022-21907 Vulnerability PoC☆30Updated 3 years ago
- This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self…☆26Updated 3 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated 11 months ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆27Updated 2 years ago
- Generate image payloads in JS to bypass filters☆39Updated 4 years ago
- Bash script to generate reverse shell payloads☆20Updated 2 years ago
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆38Updated 3 years ago
- ☆10Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- PickleC2 is a post-exploitation and lateral movements framework☆94Updated 4 years ago
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆66Updated 3 years ago
- ☆42Updated 2 years ago
- ☆100Updated 4 years ago
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆15Updated 5 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago