spencerdodd / kernelpop
kernel privilege escalation enumeration and exploitation framework
☆689Updated 6 years ago
Alternatives and similar repositories for kernelpop:
Users that are interested in kernelpop are comparing it to the libraries listed below
- Payload development framework☆701Updated this week
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆725Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆488Updated 3 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆325Updated 3 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆969Updated 7 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 8 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆952Updated 4 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆744Updated last year
- Post Exploitation Collection☆1,556Updated 4 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆743Updated 6 years ago
- A shellcode writing toolkit☆661Updated 2 years ago
- Micro$oft Windows Hacking Pack☆518Updated 6 years ago
- Tool for extracting information from newly spawned processes☆745Updated 3 years ago
- My proof-of-concept exploits for the Linux kernel☆1,462Updated 2 years ago
- Interactive shellcoding environment to easily craft shellcodes☆892Updated 3 years ago
- Linux Exploit Suggester; based on operating system release number☆1,779Updated 10 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆665Updated 5 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,050Updated 4 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,006Updated 6 years ago
- Python PTY backdoors - full PTY or nothing!☆742Updated 10 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆888Updated 4 years ago
- ☆1,138Updated 7 years ago
- A tool to help you write binary exploits☆607Updated 5 years ago
- An exploit for Apache Struts CVE-2018-11776☆301Updated 6 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Updated 7 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆208Updated 2 years ago
- A handy collection of my public exploits, all in one place.☆603Updated last year
- Vulnerability Labs for security analysis☆1,164Updated 3 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆568Updated 10 years ago
- DNS-Shell is an interactive Shell over DNS channel☆524Updated 4 years ago