mzet- / les-resView external linksLinks
Additional resources and references for linux-exploit-suggester.sh
โ30Oct 2, 2020Updated 5 years ago
Alternatives and similar repositories for les-res
Users that are interested in les-res are comparing it to the libraries listed below
Sorting:
- r2con 2020 CTF kernel challengeโ12Sep 13, 2020Updated 5 years ago
- ๐ Python Exploit for CVE-2022-23935โ11Feb 10, 2023Updated 3 years ago
- oneliner is a tool that gives a list of compatible reverse-shell-string onelinersโ24Jul 30, 2016Updated 9 years ago
- โ10Jan 30, 2022Updated 4 years ago
- โ10Oct 25, 2017Updated 8 years ago
- python scriptsโ15Dec 5, 2019Updated 6 years ago
- Install hamachi on your raspberry piโ16Jul 26, 2025Updated 6 months ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.โ18Aug 6, 2021Updated 4 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.โ15Sep 25, 2017Updated 8 years ago
- CVE-2022-26134 - Confluence Pre-Auth RCE | OGNL injectionโ32Jun 3, 2022Updated 3 years ago
- Bluetooth device and service discovery tool that can be used for security assessment and penetration testingโ16Dec 15, 2015Updated 10 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesomeโฆโ24Jul 7, 2022Updated 3 years ago
- Gets Reverse DNS, GeoIP, NMAP, Traceroute and pulls HTTP Headers for an IP address.โ21May 12, 2015Updated 10 years ago
- keynote I gave at GreHack 2019โ19Nov 17, 2019Updated 6 years ago
- โ20Dec 13, 2019Updated 6 years ago
- Extracting bits from Microscope images of ROM Constants, and disassembling them into readable 8051 assembly codeโ22Mar 22, 2021Updated 4 years ago
- Remote Linux Loadable Kernel Module (LKM) rootkit (For Linux Kernels 5.x). Shell command execution by ping.โ22Jul 24, 2022Updated 3 years ago
- A PyQt5 frontend to the binjatron plugin for Binary Ninja that includes highlighting features aimed at making it easier for beginners to โฆโ24Aug 22, 2017Updated 8 years ago
- Various PoCs and challenges regarding heap userland exploitationโ54Jun 15, 2018Updated 7 years ago
- ROP Wargame repositoryโ27Sep 11, 2017Updated 8 years ago
- Detect patterns of bad behavior in function callsโ25Jul 21, 2020Updated 5 years ago
- โ12May 13, 2020Updated 5 years ago
- ไธไธช็ฎๅ็ๆน้urlๅญๆดปๆฃๆตๅทฅๅ ทโ26Jun 11, 2021Updated 4 years ago
- โ26May 10, 2021Updated 4 years ago
- โ16Jul 28, 2020Updated 5 years ago
- practiceโ68Mar 19, 2020Updated 5 years ago
- NTPD remote DOS exploit and vulnerable containerโ25Oct 30, 2017Updated 8 years ago
- RCE PoC for Empire C2 framework <5.9.3โ28Feb 24, 2024Updated last year
- CHAOS RAT web panel path RCE PoCโ30Apr 15, 2024Updated last year
- Pocsuite3 For CVE-2021-22205โ86Oct 28, 2021Updated 4 years ago
- Express security essentials deployment for Linux Serversโ60Oct 19, 2020Updated 5 years ago
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCEโ31Mar 13, 2019Updated 6 years ago
- CVE-2022-0492 EXP and Analysis write upโ33Mar 11, 2022Updated 3 years ago
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driverโ31May 1, 2022Updated 3 years ago
- Apache Tomcat Manager API WAR Shell Uploadโ35Jul 9, 2020Updated 5 years ago
- ARP Poisoning Defense Scriptsโ38Oct 14, 2017Updated 8 years ago
- An LLVM based mini-C to Verilog High-level Synthesis toolโ39Mar 7, 2025Updated 11 months ago
- CVE-2023-34960 Chamilo PoCโ34Jun 9, 2023Updated 2 years ago
- avarehelperโ12Aug 15, 2021Updated 4 years ago