irsl / gcp-dhcp-takeover-code-exec
Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent
☆535Updated 3 years ago
Alternatives and similar repositories for gcp-dhcp-takeover-code-exec:
Users that are interested in gcp-dhcp-takeover-code-exec are comparing it to the libraries listed below
- Credentials Dumper for Linux using eBPF☆1,136Updated 6 months ago
- ☆1,115Updated 4 years ago
- Private key usage verification☆430Updated 3 months ago
- ☆687Updated 4 months ago
- A tool for IDN homograph attacks and detection.☆734Updated 4 years ago
- CVE-2022-0185☆368Updated 2 years ago
- PoC exploits for software vulnerabilities☆678Updated 3 years ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆708Updated 2 years ago
- A fast and secure multi protocol honeypot.☆316Updated 2 years ago
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆680Updated this week
- Utility to find AES keys in running processes☆334Updated last year
- eBPF Port Knocking Tool☆232Updated last year
- Reverse proxies cheatsheet☆1,803Updated last year
- Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt☆183Updated 2 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆796Updated 2 years ago
- PoC for CVE-2021-3156 (sudo heap overflow)☆434Updated 2 years ago
- A GNU/Linux monitoring and profiling tool focused on single processes.☆674Updated 3 years ago
- Fast HTTP enumerator☆477Updated 3 months ago
- Finding potential software vulnerabilities from git commit messages☆409Updated last year
- Execute ELF files without dropping them on disk☆491Updated 9 months ago
- Nginx 18.1 04/09/22 zero-day repo☆372Updated 2 years ago
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,595Updated last year
- Avast JavaScript Interactive Shell☆670Updated 5 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,919Updated 2 years ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆833Updated 3 months ago
- Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.☆792Updated 11 months ago
- Fully dockerized Linux kernel debugging environment☆748Updated 6 months ago
- Imagine your SSH server only listens on an IPv6 address, and where the last 6 digits are changing every 30 seconds as a TOTP code...☆418Updated 3 years ago
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.☆1,568Updated 2 years ago
- Detects which DNS server is being used - https://which.nameserve.rs/☆411Updated last year