bcoles / local-exploits
Various local exploits
☆141Updated 3 years ago
Alternatives and similar repositories for local-exploits
Users that are interested in local-exploits are comparing it to the libraries listed below
Sorting:
- Linux privilege escalation via LXD☆133Updated 5 years ago
- Collection of different exploits☆182Updated 4 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆381Updated 2 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆257Updated 4 years ago
- Linux post exploitation privilege escalation enumeration☆256Updated 4 years ago
- Linux Privilege Escalation Tool☆184Updated 6 years ago
- Simple python script to extract unsafe functions from php projects☆199Updated 7 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆209Updated 2 years ago
- Pip install exploit package☆158Updated 6 years ago
- Various kernel exploits☆775Updated last year
- Custom tools and projects about security☆110Updated 4 years ago
- This will give you shell access on the target system if redis server is not configured properly and faced on the internet without any aut…☆100Updated 5 years ago
- Automatic exploit generation for simple linux pwn challenges.☆321Updated 2 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Updated 3 years ago
- A bunch of my exploit development helper tools, collected in one place.☆141Updated 2 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆380Updated 4 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆669Updated 6 years ago
- Root shell PoC for CVE-2021-3156☆151Updated 3 years ago
- ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container☆135Updated 7 years ago
- OSCP All Tools are Here ...!! ***☆1Updated 5 years ago
- ☆165Updated 4 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆561Updated last year
- Linux PAM Backdoor☆328Updated last year
- ☆145Updated 5 years ago
- Python implementation of Metasploit's pattern_create/pattern_offset.☆73Updated 5 years ago
- Search Exploitable Software on Linux☆227Updated 2 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆262Updated 7 years ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆156Updated 4 years ago
- CVE-2020-0796 Local Privilege Escalation POC☆241Updated 5 years ago