bcoles / kernel-exploits
Various kernel exploits
☆753Updated 10 months ago
Alternatives and similar repositories for kernel-exploits:
Users that are interested in kernel-exploits are comparing it to the libraries listed below
- Sudo Baron Samedit Exploit☆738Updated 3 years ago
- PoC for CVE-2021-3156 (sudo heap overflow)☆432Updated 2 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆704Updated 5 years ago
- A collection of links related to VMware escape exploits☆1,386Updated 4 months ago
- My proof-of-concept exploits for the Linux kernel☆1,458Updated 2 years ago
- ☆1,129Updated 7 years ago
- Proofs-of-concept☆779Updated 4 months ago
- Linux 4.10 < 5.1.17 PTRACE_TRACEME local root☆327Updated 5 years ago
- ☆1,329Updated 4 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆528Updated 3 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆808Updated last year
- share some useful archives about vm and qemu escape exploit.☆536Updated 9 months ago
- An updated collection of resources targeting browser-exploitation.☆813Updated 3 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,305Updated 4 years ago
- Dirty Cow exploit - CVE-2016-5195☆871Updated 3 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆811Updated 4 years ago
- PoC exploits for software vulnerabilities☆674Updated 3 years ago
- Ubuntu OverlayFS Local Privesc☆413Updated 9 months ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,194Updated 5 months ago
- Some of my exploits.☆574Updated 3 years ago
- A collection of statically compiled tools like Nmap and Socat.☆433Updated 9 months ago
- ☆962Updated 3 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆662Updated 5 years ago
- For Linux binary Exploitation☆823Updated 6 years ago
- CTF writeups from Balsn☆475Updated 2 years ago
- CVE-2020-0796 Remote Code Execution POC☆543Updated 4 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,123Updated last year
- A docker environment for pwn in ctf☆753Updated last year
- Repository for information about 0-days exploited in-the-wild.☆769Updated 2 months ago
- Tool for extracting information from newly spawned processes☆745Updated 2 years ago