initstring / dirty_sock
Linux privilege escalation exploit via snapd (CVE-2019-7304)
☆668Updated 5 years ago
Alternatives and similar repositories for dirty_sock:
Users that are interested in dirty_sock are comparing it to the libraries listed below
- [Linux] Two Privilege Escalation techniques abusing sudo token☆714Updated 6 years ago
- Some of my exploits.☆580Updated 4 years ago
- kernel privilege escalation enumeration and exploitation framework☆690Updated 6 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆561Updated last year
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆976Updated 7 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆575Updated 10 months ago
- Smart Install Exploitation Tool☆578Updated 3 years ago
- Exploit written in Python for CVE-2018-15473 with threading and export formats☆523Updated 9 months ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆534Updated 4 years ago
- Tool for extracting information from newly spawned processes☆753Updated 3 years ago
- ☆1,150Updated 8 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆381Updated 2 years ago
- GTRS - Google Translator Reverse Shell☆615Updated 6 months ago
- There is no pre-auth RCE in Jenkins since May 2017, but this is the one!☆603Updated 5 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆498Updated last year
- An XSS reverse shell framework☆307Updated 6 years ago
- DNS Rebinding Exploitation Framework☆488Updated 4 years ago
- Python PTY backdoors - full PTY or nothing!☆743Updated 10 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆256Updated last year
- Search for Directory Traversal Vulnerabilities☆440Updated 10 months ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆999Updated 3 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆257Updated 4 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆695Updated 4 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆521Updated 3 years ago
- Linux post exploitation privilege escalation enumeration☆256Updated 4 years ago
- PoC for CVE-2019-5736☆647Updated 3 years ago
- Automated script for performing Padding Oracle attacks☆772Updated 9 months ago
- Automatic exploit generation for simple linux pwn challenges.☆321Updated last year
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆746Updated last year