bcoles / kernel-exploitsLinks
Various kernel exploits
☆781Updated last year
Alternatives and similar repositories for kernel-exploits
Users that are interested in kernel-exploits are comparing it to the libraries listed below
Sorting:
- Proofs-of-concept☆801Updated 10 months ago
- Linux 4.10 < 5.1.17 PTRACE_TRACEME local root☆331Updated 5 years ago
- PoC for CVE-2021-3156 (sudo heap overflow)☆438Updated 3 years ago
- A collection of links related to VMware escape exploits☆1,447Updated 10 months ago
- Ubuntu OverlayFS Local Privesc☆426Updated last year
- [Linux] Two Privilege Escalation techniques abusing sudo token☆715Updated 6 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆538Updated 3 years ago
- My proof-of-concept exploits for the Linux kernel☆1,473Updated 3 years ago
- Sudo Baron Samedit Exploit☆759Updated 3 years ago
- ☆1,160Updated 8 years ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,237Updated 11 months ago
- Dirty Cow exploit - CVE-2016-5195☆889Updated 4 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆812Updated 2 years ago
- A collection of statically compiled tools like Nmap and Socat.☆449Updated last year
- PoC exploits for software vulnerabilities☆680Updated 3 years ago
- ☆1,348Updated 5 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,326Updated 4 years ago
- Some of my exploits.☆587Updated 4 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆670Updated 6 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆801Updated 3 years ago
- Repository for information about 0-days exploited in-the-wild.☆800Updated 2 months ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆827Updated 5 years ago
- ☆983Updated 4 years ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆848Updated 2 months ago
- Proof of Concepts☆1,262Updated 8 months ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,132Updated last year
- share some useful archives about vm and qemu escape exploit.☆550Updated last year
- A docker environment for pwn in ctf☆765Updated last year
- For Linux binary Exploitation☆832Updated 7 years ago
- CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation☆571Updated 3 years ago