bcoles / local-exploitsLinks
Various local exploits
☆141Updated 3 years ago
Alternatives and similar repositories for local-exploits
Users that are interested in local-exploits are comparing it to the libraries listed below
Sorting:
- Linux privilege escalation via LXD☆136Updated 5 years ago
- ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container☆138Updated 7 years ago
- Collection of different exploits☆182Updated 4 years ago
- Pip install exploit package☆157Updated 6 years ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆157Updated 4 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆381Updated 2 years ago
- Linux post exploitation privilege escalation enumeration☆257Updated 4 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆264Updated 7 years ago
- Simple python script to extract unsafe functions from php projects☆199Updated 7 years ago
- This will give you shell access on the target system if redis server is not configured properly and faced on the internet without any aut…☆100Updated 5 years ago
- Windows binaries from Kali Linux : http://git.kali.org/gitweb/?p=packages/windows-binaries.git;a=summary☆91Updated 4 years ago
- Search Exploitable Software on Linux☆230Updated 2 years ago
- Linux Privilege Escalation Tool☆184Updated 6 years ago
- Custom tools and projects about security☆110Updated 3 weeks ago
- Containing Self Made Perl Reproducers / PoC Codes☆195Updated 5 years ago
- The walkthrough of hack the box☆67Updated 2 years ago
- ☆114Updated 4 years ago
- REPTILEHAUS' simplified build process of Worawit Wang' (@sleepya_) version of EternalBlue.. The NSA exploit brought to you by the ShadowB…☆126Updated 2 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆254Updated 2 years ago
- Python implementation of Metasploit's pattern_create/pattern_offset.☆73Updated 5 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆211Updated 2 years ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆125Updated 6 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆257Updated 4 years ago
- Web-based check for Windows privesc vulnerabilities☆139Updated 2 years ago
- ☆58Updated 6 years ago
- A Linux enumeration script for Hack The Box☆191Updated 5 years ago
- Scripts to execute enumeration via LFI☆89Updated 6 years ago
- Root shell PoC for CVE-2021-3156☆152Updated 3 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- ☆67Updated 11 years ago