nickswang / kubekitLinks
kubernetes rootkit
☆34Updated 2 years ago
Alternatives and similar repositories for kubekit
Users that are interested in kubekit are comparing it to the libraries listed below
Sorting:
- Linux Process Injection via Seccomp Notifier☆79Updated last month
- ☆41Updated last year
- ☆68Updated 2 years ago
- ☆137Updated 2 years ago
- Proof-of-Concept for CVE-2024-21345☆76Updated last year
- ☆37Updated last week
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆32Updated 4 months ago
- ☆82Updated last year
- ☆122Updated last year
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆31Updated 11 months ago
- Analysis of the vulnerability☆50Updated last year
- CVE-2024-30090 - LPE PoC☆107Updated last year
- ☆74Updated 5 months ago
- Plantronics Desktop Hub LPE☆37Updated last year
- ☆39Updated 8 months ago
- ☆16Updated last year
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆49Updated 11 months ago
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Updated 2 months ago
- Beacon Debugger☆55Updated last year
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆135Updated last year
- WSUS Unauthenticated RCE☆167Updated 2 months ago
- Learnings about windows Internals☆98Updated 2 years ago
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆30Updated 2 months ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Updated last year
- 7z exploit POC versions prior to 25.01☆33Updated 5 months ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Updated 11 months ago
- Repo that holds random POCs☆52Updated 2 years ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆36Updated 8 months ago
- LPE of CVE-2024-26230☆23Updated last year
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25Updated last year