mzet- / les-resView external linksLinks
Additional resources and references for linux-exploit-suggester.sh
☆30Oct 2, 2020Updated 5 years ago
Alternatives and similar repositories for les-res
Users that are interested in les-res are comparing it to the libraries listed below
Sorting:
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- A simple bash script to remove (purge) unused linux kernels☆11Mar 9, 2017Updated 8 years ago
- oneliner is a tool that gives a list of compatible reverse-shell-string oneliners☆24Jul 30, 2016Updated 9 years ago
- Vulnerability Scanner☆11Dec 23, 2014Updated 11 years ago
- python scripts☆15Dec 5, 2019Updated 6 years ago
- ☆10Oct 25, 2017Updated 8 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- Web Browser Hooking Framework. Manage, execute and assess web browser vulnerabilities☆40Aug 2, 2018Updated 7 years ago
- CVE-2022-26134 - Confluence Pre-Auth RCE | OGNL injection☆32Jun 3, 2022Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Jul 7, 2022Updated 3 years ago
- Simple windows backdoor command shell.☆20Dec 4, 2017Updated 8 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- Python implementation of the SlowLoris DoS attack.☆24Mar 19, 2017Updated 8 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- Extracting bits from Microscope images of ROM Constants, and disassembling them into readable 8051 assembly code☆22Mar 22, 2021Updated 4 years ago
- Remote Linux Loadable Kernel Module (LKM) rootkit (For Linux Kernels 5.x). Shell command execution by ping.☆22Jul 24, 2022Updated 3 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆25Nov 12, 2014Updated 11 years ago
- My AddressSanitizer implementation in C☆29Jan 29, 2021Updated 5 years ago
- A PyQt5 frontend to the binjatron plugin for Binary Ninja that includes highlighting features aimed at making it easier for beginners to …☆24Aug 22, 2017Updated 8 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Jun 15, 2018Updated 7 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- ☆26May 10, 2021Updated 4 years ago
- ☆12May 13, 2020Updated 5 years ago
- Modular command-line tool to parse, create and manipulate JWT tokens for hackers☆105Mar 17, 2023Updated 2 years ago
- practice☆68Mar 19, 2020Updated 5 years ago
- Windows 下获取 Chrome、Chromium Edge 浏览器的账号密码、Cookie、历史记录、下载记录、书签等信息☆26Dec 7, 2021Updated 4 years ago
- ☆29Apr 22, 2017Updated 8 years ago
- NTPD remote DOS exploit and vulnerable container☆25Oct 30, 2017Updated 8 years ago
- Pocsuite3 For CVE-2021-22205☆86Oct 28, 2021Updated 4 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆31Mar 13, 2019Updated 6 years ago
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31May 1, 2022Updated 3 years ago
- A simple embedded Linux backdoor.☆199Oct 25, 2020Updated 5 years ago
- CVE-2023-34960 Chamilo PoC☆34Jun 9, 2023Updated 2 years ago
- rce exploit , made to work with pocsuite3☆122Aug 19, 2019Updated 6 years ago
- An LLVM based mini-C to Verilog High-level Synthesis tool☆39Mar 7, 2025Updated 11 months ago