A privilege escalation exploit in the Steam Client
☆13Aug 11, 2019Updated 6 years ago
Alternatives and similar repositories for steam-privesc
Users that are interested in steam-privesc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Oct 14, 2017Updated 8 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- cs2 server crasher found by me. already patched on valve ds. posted for educational purposes as tutorial how to beat cheaters☆17Dec 6, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Escalation Servers and Scripts for Priv Escalation☆18Jul 20, 2019Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Solutions to CTF problems.☆11May 29, 2016Updated 9 years ago
- XXE Injection Payloads☆28Jul 30, 2019Updated 6 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- #Lets_Do_Face_Recognition OpenCv + Python3 + DataSetgenerator : To make a face recognition program, first we need to train the recognizer…☆10Oct 25, 2018Updated 7 years ago
- ☆30Sep 5, 2025Updated 7 months ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Uberspacify helps you deploy a Ruby on Rails app on Uberspace, a popular shared hosting provider.☆71Dec 20, 2015Updated 10 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆31Sep 30, 2019Updated 6 years ago
- Teaching material for COMP30027/COMP90049 Machine Learning☆14Oct 20, 2023Updated 2 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Aug 18, 2019Updated 6 years ago
- Simple script for web directory scanning☆33May 22, 2023Updated 2 years ago
- The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS☆37Feb 25, 2023Updated 3 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 6 years ago
- Script which display image (ad) downloaded from the internet.☆14Feb 2, 2020Updated 6 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆25Oct 13, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- Solving Amazon's digital assistants problem☆21Feb 1, 2022Updated 4 years ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated 2 months ago
- A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆35Jan 12, 2026Updated 3 months ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 7 months ago
- The game of chess in Pygame.☆11Jan 25, 2021Updated 5 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- A sub-domain reconnaissance written in golang☆12Jan 11, 2018Updated 8 years ago
- Recordization library☆11Apr 8, 2026Updated last week
- Team: _blank_☆13May 23, 2019Updated 6 years ago
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 9 years ago
- A Dissect module implementing a parser for Microsofts Extensible Storage Engine Database (ESEDB), used for example in Active Directory, E…☆25Nov 20, 2025Updated 5 months ago