Proof of concept about the privilege escalation flaw identified in Google's Osconfig
☆10Sep 20, 2020Updated 5 years ago
Alternatives and similar repositories for google-osconfig-privesc
Users that are interested in google-osconfig-privesc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- .4k4xs4pH1r3☆12Apr 8, 2026Updated last month
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 3 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated last month
- Simple RAT in C#☆26Apr 11, 2020Updated 6 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- ☆13Aug 13, 2017Updated 8 years ago
- Human Oriented SHell☆31Updated this week
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- Unicode encoding attacks with machine learning☆97Nov 25, 2021Updated 4 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- ☆13Mar 17, 2021Updated 5 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Docker image for hacking☆21Feb 10, 2025Updated last year
- WRecon is an open source no intussive web scanner. It is designed to discover all URL in a website recursively, without using bruteforce …☆19Oct 23, 2020Updated 5 years ago
- Using open Adb ports we can exploit a Andriod Device☆19Jun 30, 2019Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- A place for new or unstable packages.☆36Apr 30, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🐊 A small Password Attack☆15Apr 1, 2024Updated 2 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Web Recon & Exploitation Tool.☆56Mar 8, 2020Updated 6 years ago
- Custom security distro for remote penetration testing☆56Mar 26, 2021Updated 5 years ago
- ☆18Jul 30, 2024Updated last year
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- Ashok is a Osint Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration t…☆26May 8, 2020Updated 6 years ago
- PEDA - Python Exploit Development Assistance for GDB☆24Aug 6, 2025Updated 9 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Just Mod Version of lokiboard with remote reporting via Gmail☆47Jun 12, 2020Updated 5 years ago
- wifi attacks suite☆59Sep 24, 2020Updated 5 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated 2 years ago
- Monitoring Registry and File Changes in Windows☆69Apr 12, 2026Updated 3 weeks ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago