lockedbyte / CVE-ExploitsLinks
PoC exploits for software vulnerabilities
☆682Updated 4 years ago
Alternatives and similar repositories for CVE-Exploits
Users that are interested in CVE-Exploits are comparing it to the libraries listed below
Sorting:
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆831Updated 4 years ago
- PoC for CVE-2021-3156 (sudo heap overflow)☆435Updated 3 years ago
- ☆990Updated 4 years ago
- Various kernel exploits☆795Updated last year
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆851Updated 5 months ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆720Updated 6 years ago
- ☆698Updated 10 months ago
- Automatic exploit generation for simple linux pwn challenges.☆320Updated 2 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆803Updated 3 years ago
- Sudo Baron Samedit Exploit☆775Updated 3 years ago
- Microsoft » Windows 10 : Security Vulnerabilities☆928Updated 5 months ago
- Root shell PoC for CVE-2021-3156☆156Updated 3 years ago
- CVE-2020-0796 Remote Code Execution POC☆567Updated 5 years ago
- Repository for information about 0-days exploited in-the-wild.☆833Updated 2 weeks ago
- Exploit Code for CVE-2020-1472 aka Zerologon☆384Updated 4 years ago
- Exploit for zerologon cve-2020-1472☆670Updated 4 years ago
- PoC for Zerologon - all research credits go to Tom Tervoort of Secura☆1,257Updated 4 years ago
- Linux post exploitation privilege escalation enumeration☆259Updated 5 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆678Updated 6 years ago
- exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House