CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability
☆21Mar 8, 2022Updated 3 years ago
Alternatives and similar repositories for CVE_2022_0847
Users that are interested in CVE_2022_0847 are comparing it to the libraries listed below
Sorting:
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆19May 19, 2023Updated 2 years ago
- ☆12Oct 7, 2020Updated 5 years ago
- LazyRev for Lazy People☆21Jul 5, 2023Updated 2 years ago
- Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847.☆58Mar 8, 2022Updated 3 years ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31May 23, 2025Updated 9 months ago
- A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.☆25Dec 4, 2020Updated 5 years ago
- Netcat for windows.☆21Sep 23, 2018Updated 7 years ago
- Remote Linux Loadable Kernel Module (LKM) rootkit (For Linux Kernels 5.x). Shell command execution by ping.☆22Jul 24, 2022Updated 3 years ago
- A javascript based botnet/C&C to remotely manage/control browsers.☆24Feb 4, 2022Updated 4 years ago
- A proof-of-concept Node.js ransomware☆21Mar 27, 2022Updated 3 years ago
- Nmap script to check vulnerability CVE-2021-21975☆27Apr 2, 2021Updated 4 years ago
- ☆28Dec 2, 2021Updated 4 years ago
- Additional resources and references for linux-exploit-suggester.sh☆30Oct 2, 2020Updated 5 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 3 months ago
- Remote command shell application written in C# targeting the .NET runtime.☆29Updated this week
- A Mirai type botnet called "Meerkat" very known in the community. Methods include basic TCP flags, L7, OVH, UDPRAW & UDP, XMAS, STD, & GR…☆25Aug 21, 2022Updated 3 years ago
- DAG-based blockchain☆10Apr 20, 2019Updated 6 years ago
- A Linux RAT in C☆33Oct 29, 2018Updated 7 years ago
- A Python script that runs a machine learning analysis on data from RaiGames.io to predict the next crash.☆11Jun 21, 2022Updated 3 years ago
- A Silent Miner that mines Crypto - XMR and ETH☆16Feb 5, 2023Updated 3 years ago
- CVE-2023-34960 Chamilo PoC☆34Jun 9, 2023Updated 2 years ago
- The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS☆37Feb 25, 2023Updated 3 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Sep 3, 2022Updated 3 years ago
- Kernel module that makes it possible to create virtual wifi devices each with a virtualized stack.☆11Dec 13, 2011Updated 14 years ago
- This is a hanabi AI bot that can play on http://keldon.net/hanabi/☆11May 29, 2017Updated 8 years ago
- Keep track of a GSM device and show its location on a map☆11Apr 14, 2016Updated 9 years ago
- OSCP☆37Nov 24, 2021Updated 4 years ago
- Web for Pentester I☆11Sep 21, 2018Updated 7 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- ☆10Jun 1, 2022Updated 3 years ago
- A way to get fake followers on Clubhouse☆10Jan 6, 2022Updated 4 years ago
- ME314 Introduction to Data Science and Big Data Analytics 2018☆10Jul 29, 2018Updated 7 years ago
- CVE-2022-26134 - Confluence Pre-Auth RCE | OGNL injection☆32Jun 3, 2022Updated 3 years ago
- ☆37Apr 24, 2022Updated 3 years ago
- PoC for CVE-2022-22954 - VMware Workspace ONE Access Freemarker Server-Side Template Injection☆10Apr 12, 2022Updated 3 years ago
- DD Liberator 3D Gun Blueprint☆15May 10, 2013Updated 12 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- IR remote control for my Car PC. Emulates keyboard and mouse USB HID Combo device.☆10Jan 30, 2016Updated 10 years ago