initstring / dirty_sockLinks
Linux privilege escalation exploit via snapd (CVE-2019-7304)
☆684Updated 6 years ago
Alternatives and similar repositories for dirty_sock
Users that are interested in dirty_sock are comparing it to the libraries listed below
Sorting:
- [Linux] Two Privilege Escalation techniques abusing sudo token☆732Updated 6 years ago
- Some of my exploits.☆598Updated 4 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆381Updated 3 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆567Updated last year
- kernel privilege escalation enumeration and exploitation framework☆700Updated 7 years ago
- Python PTY backdoors - full PTY or nothing!☆751Updated 11 years ago
- Search gtfobins and lolbas files from your terminal☆461Updated 3 years ago
- GTRS - Google Translator Reverse Shell☆625Updated 4 months ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆982Updated 8 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆260Updated 4 years ago
- Smart Install Exploitation Tool☆593Updated 4 years ago
- Debian OpenSSL Predictable PRNG (CVE-2008-0166)☆410Updated 3 years ago
- Exploit written in Python for CVE-2018-15473 with threading and export formats☆533Updated last year
- Bash post exploitation toolkit☆744Updated 2 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆297Updated 6 years ago
- Tool for extracting information from newly spawned processes☆775Updated 8 months ago
- Automated script for performing Padding Oracle attacks☆803Updated last year
- Contents for Node.Js Security Course☆343Updated 5 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆573Updated last year
- Herramienta para evadir disable_functions y open_basedir☆487Updated 2 years ago
- ☆266Updated 6 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆704Updated 5 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆264Updated 2 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆385Updated 5 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆891Updated 5 years ago
- An XSS reverse shell framework☆310Updated 7 years ago
- Linux post exploitation privilege escalation enumeration☆259Updated 5 years ago
- ☆1,185Updated 8 years ago
- Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002)☆593Updated 5 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆555Updated 5 years ago