ahrixia / CVE_2022_0847
CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability
☆22Updated 2 years ago
Alternatives and similar repositories for CVE_2022_0847:
Users that are interested in CVE_2022_0847 are comparing it to the libraries listed below
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆31Updated 3 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960☆2Updated 2 years ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 2 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- A python approach to interacting with web shells.☆29Updated 4 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 3 years ago
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)☆71Updated 2 years ago
- Bash script to generate reverse shell payloads☆20Updated last year
- Just another script for automatize boolean-based blind SQL injections. (Demo)☆53Updated 2 years ago
- Classic Web shell upload techniques & Web RCE techniques☆24Updated 2 months ago
- ☆29Updated 2 years ago
- ASPX Shellcode Ceasar Encrypted Generator is a Python script automating shellcode generation, embedding, encryption, and execution in an …☆11Updated last year
- Windows Privilege Escalation☆54Updated 2 years ago
- WordPress - Authenticated XXE (CVE-2021-29447)☆42Updated 3 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆22Updated 3 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 2 years ago
- Simple recon tool automates your recon process☆16Updated last year
- Post-exploitation tool for attacking Active Directory domain controllers☆17Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- POC FortiOS SSL-VPN buffer overflow vulnerability☆27Updated last year
- ☆24Updated last year
- ☆16Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆53Updated 2 years ago
- This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft☆22Updated 2 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated last year