irsl / gcp-dhcp-takeover-code-exec
Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent
☆536Updated 3 years ago
Alternatives and similar repositories for gcp-dhcp-takeover-code-exec:
Users that are interested in gcp-dhcp-takeover-code-exec are comparing it to the libraries listed below
- PoC for CVE-2021-3156 (sudo heap overflow)☆434Updated 2 years ago
- Avast JavaScript Interactive Shell☆667Updated 4 years ago
- Credentials Dumper for Linux using eBPF☆1,131Updated 5 months ago
- CVE-2022-0185☆367Updated 2 years ago
- ☆686Updated 2 months ago
- PoC exploits for software vulnerabilities☆676Updated 3 years ago
- A tool for IDN homograph attacks and detection.☆731Updated 4 years ago
- Utility to find AES keys in running processes☆334Updated last year
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆241Updated 2 years ago
- Imagine your SSH server only listens on an IPv6 address, and where the last 6 digits are changing every 30 seconds as a TOTP code...☆418Updated 3 years ago
- ☆1,115Updated 4 years ago
- Test ssh login key acceptance without having the private key☆215Updated 3 years ago
- The world's worst kernel module☆296Updated 3 years ago
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆677Updated 5 months ago
- eBPF Port Knocking Tool☆232Updated last year
- ☆168Updated 2 years ago
- Private key usage verification☆424Updated 2 months ago
- A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. T…☆944Updated 3 years ago
- all paths lead to clouds☆637Updated last year
- ☆251Updated 4 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆660Updated last year
- No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are alread…☆180Updated 3 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆885Updated 9 months ago
- Reverse proxies cheatsheet☆1,799Updated last year
- collection of verified Linux kernel exploits☆186Updated 4 years ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆448Updated 8 months ago
- Silly usage of AWS EC2 IPv6 prefixes☆321Updated 3 years ago
- ☆241Updated 7 months ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆422Updated last year
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆823Updated 3 years ago