Linux privilege escalation via LXD
☆141Mar 4, 2020Updated 6 years ago
Alternatives and similar repositories for lxd_root
Users that are interested in lxd_root are comparing it to the libraries listed below
Sorting:
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆732Apr 14, 2019Updated 6 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆300Oct 2, 2019Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Jun 26, 2019Updated 6 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 6 years ago
- A simple remote scanner for Sitecore CMS☆13May 28, 2024Updated last year
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆15Jun 6, 2019Updated 6 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Some of my exploits.☆601Feb 25, 2021Updated 5 years ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,313Dec 15, 2020Updated 5 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- A simple remote scanner for Liferay Portal☆21Apr 6, 2025Updated 11 months ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- PoC code for CVE-2019-0841 Privilege Escalation vulnerability☆242Apr 9, 2019Updated 6 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆682May 9, 2019Updated 6 years ago
- ☆12Mar 24, 2018Updated 7 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Feb 27, 2025Updated last year
- ☆36Mar 11, 2019Updated 7 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- ☆12Aug 5, 2015Updated 10 years ago
- ☆299Nov 9, 2020Updated 5 years ago
- ☆165May 1, 2019Updated 6 years ago
- A C# tool for enumerating remote access policies through group policy.☆73Apr 18, 2019Updated 6 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Synaptics Audio Driver LPE☆38Apr 15, 2019Updated 6 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- ☆54Apr 27, 2019Updated 6 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- The full story of the CLR implementation of Meterpreter☆153Jul 29, 2020Updated 5 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆541Apr 14, 2021Updated 4 years ago
- CentOS Control Web Panel, Root Privilege Escalation☆67Oct 25, 2019Updated 6 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Abusing Exchange via EWS☆153Sep 14, 2020Updated 5 years ago