lockedbyte / CVE-Exploits
PoC exploits for software vulnerabilities
☆676Updated 3 years ago
Related projects: ⓘ
- ☆943Updated 3 years ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆825Updated 3 years ago
- PoC for CVE-2021-3156 (sudo heap overflow)☆430Updated 2 years ago
- Various kernel exploits☆732Updated 6 months ago
- ☆684Updated last year
- [Linux] Two Privilege Escalation techniques abusing sudo token☆690Updated 5 years ago
- PoC for Zerologon - all research credits go to Tom Tervoort of Secura☆1,173Updated 3 years ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆812Updated 7 months ago
- Repository for information about 0-days exploited in-the-wild.☆752Updated 3 weeks ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,295Updated 3 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,318Updated last year
- ☆943Updated this week
- A collection of links related to VMware escape exploits☆1,354Updated 2 weeks ago
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,051Updated 2 months ago
- Sudo Baron Samedit Exploit☆731Updated 2 years ago
- Exploit for zerologon cve-2020-1472☆625Updated 3 years ago
- CVE-2020-0796 Remote Code Execution POC☆531Updated 4 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆615Updated 3 years ago
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,830Updated 3 years ago
- Automatic exploit generation for simple linux pwn challenges.☆314Updated last year
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆662Updated 5 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆794Updated 2 years ago
- RCE 0-day for GhostScript 9.50 - Payload generator☆539Updated 3 years ago
- Exploit Code for CVE-2020-1472 aka Zerologon☆374Updated 3 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆858Updated 4 months ago
- Exploit allowing you to read registry hives as non-admin on Windows 10 and 11☆706Updated 3 years ago
- A collection of proof-of-concept exploit scripts written by the team at Rhino Security Labs for various CVEs.☆791Updated 2 months ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,024Updated 2 years ago
- ☆1,094Updated 7 years ago
- Some of my exploits.☆572Updated 3 years ago