LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Race Condtiton” which results in “User - After - Free”. Looking at the code, I realized that this could be used to execute my code in the Linux kernel and get LPE on a potential victim.
☆43Jun 12, 2024Updated last year
Alternatives and similar repositories for GSM_Linux_Kernel_LPE_Nday_Exploit
Users that are interested in GSM_Linux_Kernel_LPE_Nday_Exploit are comparing it to the libraries listed below
Sorting:
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆850Apr 19, 2024Updated last year
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 5 months ago
- Slides of mine.☆12Apr 19, 2024Updated last year
- ☆29Aug 24, 2025Updated 6 months ago
- ☆14Mar 19, 2024Updated last year
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated 11 months ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- LPE exploit for CVE-2024-0582 (io_uring)☆101Mar 29, 2024Updated last year
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Sep 17, 2025Updated 5 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- ☆38Apr 5, 2024Updated last year
- ☆22Dec 30, 2025Updated 2 months ago
- slides for talk given during uscg 2023 combine☆38Sep 6, 2023Updated 2 years ago
- Bypassing Amsi using LdrLoadDll☆47Jan 8, 2025Updated last year
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- Leak NTLM via Website tab in teams via MS Office☆79Mar 28, 2024Updated last year
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 10 months ago
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- Tools/scripts I used/developed during the EXP-301 course.☆26May 17, 2022Updated 3 years ago
- A collection of bypasses and exploits for eBPF-based cloud security.☆26Jan 12, 2024Updated 2 years ago
- ☆23Nov 5, 2021Updated 4 years ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- ☆59Nov 13, 2024Updated last year
- Indirect syscalls + DInvoke made simple.☆95Dec 24, 2024Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- A comprehensive list of aerospace affiliated CVEs 🚀👾⚠️☆27Dec 22, 2024Updated last year
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆30Oct 2, 2025Updated 5 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆63Oct 29, 2024Updated last year
- Investigating the bug behind CVE-2021-26708☆28Feb 16, 2021Updated 5 years ago
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- ☆108Nov 7, 2024Updated last year
- This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCo…☆30Aug 5, 2024Updated last year