bcoles / local-exploitsLinks
Various local exploits
☆144Updated 3 years ago
Alternatives and similar repositories for local-exploits
Users that are interested in local-exploits are comparing it to the libraries listed below
Sorting:
- Linux privilege escalation via LXD☆139Updated 5 years ago
- This will give you shell access on the target system if redis server is not configured properly and faced on the internet without any aut…☆98Updated 5 years ago
- Collection of different exploits☆182Updated 4 years ago
- The walkthrough of hack the box☆67Updated 2 years ago
- Linux post exploitation privilege escalation enumeration☆259Updated 5 years ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆156Updated 4 years ago
- Python implementation of Metasploit's pattern_create/pattern_offset.☆73Updated 5 years ago
- Simple python script to extract unsafe functions from php projects☆197Updated 7 years ago
- ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container☆141Updated 7 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆266Updated 7 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆381Updated 2 years ago
- Pip install exploit package☆156Updated 6 years ago
- An SNMPv3 User Enumerator and Attack tool☆257Updated 5 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 3 years ago
- Containing Self Made Perl Reproducers / PoC Codes☆196Updated 5 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆73Updated 2 months ago
- Search Exploitable Software on Linux☆232Updated 2 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆254Updated 3 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Updated 4 years ago
- Linux Privilege Escalation Tool☆185Updated 6 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆204Updated 2 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆208Updated 3 years ago
- Windows binaries from Kali Linux : http://git.kali.org/gitweb/?p=packages/windows-binaries.git;a=summary☆91Updated 4 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆385Updated 4 years ago
- ☆114Updated 5 years ago
- PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE☆249Updated 5 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆259Updated 4 years ago
- Custom tools and projects about security☆110Updated 3 months ago