Linux privilege escalation exploit via snapd (CVE-2019-7304)
☆683May 9, 2019Updated 6 years ago
Alternatives and similar repositories for dirty_sock
Users that are interested in dirty_sock are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [Linux] Two Privilege Escalation techniques abusing sudo token☆731Apr 14, 2019Updated 6 years ago
- PoC code for CVE-2019-0841 Privilege Escalation vulnerability☆242Apr 9, 2019Updated 7 years ago
- Some of my exploits.☆602Feb 25, 2021Updated 5 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆300Oct 2, 2019Updated 6 years ago
- CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability☆332Dec 30, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Mar 10, 2019Updated 7 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆810Aug 28, 2022Updated 3 years ago
- Bypassing disabled exec functions in PHP (c) CRLF☆405Oct 2, 2020Updated 5 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Jan 31, 2019Updated 7 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- GTRS - Google Translator Reverse Shell☆625Sep 26, 2025Updated 6 months ago
- Proof of concept for CVE-2019-0708☆1,187Mar 16, 2026Updated 3 weeks ago
- CVE-2019-1040 with Exchange☆253Jun 18, 2021Updated 4 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,756Dec 18, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (…☆315Apr 1, 2019Updated 7 years ago
- There is no pre-auth RCE in Jenkins since May 2017, but this is the one!☆607May 17, 2019Updated 6 years ago
- Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002)☆594Jan 8, 2021Updated 5 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- ☆54Apr 27, 2019Updated 6 years ago
- Constrained Language Mode + AMSI bypass all in one☆156Jul 29, 2019Updated 6 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,351Dec 7, 2020Updated 5 years ago
- MS17-010☆2,236Jun 20, 2023Updated 2 years ago
- Java RMI enumeration and attack tool.☆745Sep 28, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆209Jan 30, 2019Updated 7 years ago
- Interactive CTF Exploration Tool☆1,666Sep 17, 2021Updated 4 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,084Apr 5, 2022Updated 4 years ago
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,564Mar 11, 2026Updated 3 weeks ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆583Sep 7, 2021Updated 4 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 7 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆702Jul 27, 2020Updated 5 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆386Dec 13, 2020Updated 5 years ago
- HTA encryption tool for RedTeams☆1,423Nov 9, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!☆298Jun 10, 2019Updated 6 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,130Dec 7, 2022Updated 3 years ago
- kernel privilege escalation enumeration and exploitation framework☆702Aug 2, 2018Updated 7 years ago
- Windows Exploit Suggester - Next Generation☆4,805Apr 2, 2026Updated last week
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,161Mar 6, 2025Updated last year
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆305Sep 7, 2022Updated 3 years ago