bcoles / local-exploitsLinks
Various local exploits
☆146Updated 3 years ago
Alternatives and similar repositories for local-exploits
Users that are interested in local-exploits are comparing it to the libraries listed below
Sorting:
- Linux privilege escalation via LXD☆141Updated 5 years ago
- Collection of different exploits☆183Updated 5 years ago
- This will give you shell access on the target system if redis server is not configured properly and faced on the internet without any aut…☆98Updated 5 years ago
- ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container☆142Updated 7 years ago
- Linux post exploitation privilege escalation enumeration☆259Updated 5 years ago
- The walkthrough of hack the box☆67Updated 2 years ago
- Pip install exploit package☆157Updated 6 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆380Updated 2 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆267Updated 7 years ago
- Simple python script to extract unsafe functions from php projects☆196Updated 7 years ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆158Updated 4 years ago
- Hearbleed exploit to retrieve sensitive information CVE-2014-0160☆84Updated 4 years ago
- Custom tools and projects about security☆110Updated 4 months ago
- Python implementation of Metasploit's pattern_create/pattern_offset.☆73Updated 6 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆384Updated 4 years ago
- Containing Self Made Perl Reproducers / PoC Codes☆196Updated 5 years ago
- SNMP data gather scripts☆84Updated last year
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 3 years ago
- Windows binaries from Kali Linux : http://git.kali.org/gitweb/?p=packages/windows-binaries.git;a=summary☆91Updated 4 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆255Updated 3 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Updated 5 years ago
- Using this script, you can enumerate Usernames and passwords of Nosql(mongodb) injecion vulnerable web applications.☆172Updated 6 years ago
- ☆67Updated 11 years ago
- Changes for Visual Studio 2013☆118Updated 10 years ago
- Shellshock exploit + vulnerable environment☆225Updated 2 years ago
- Root shell PoC for CVE-2021-3156☆156Updated 3 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆205Updated 2 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆283Updated 2 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆48Updated 10 years ago