spencerdodd / kernelpop
kernel privilege escalation enumeration and exploitation framework
☆689Updated 6 years ago
Alternatives and similar repositories for kernelpop:
Users that are interested in kernelpop are comparing it to the libraries listed below
- Payload development framework☆704Updated 2 weeks ago
- Docker container with tools for binary reverse engineering and exploitation.☆325Updated 3 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆489Updated 3 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆746Updated 6 years ago
- A shellcode writing toolkit☆662Updated 2 years ago
- Interactive shellcoding environment to easily craft shellcodes☆893Updated 4 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆725Updated 7 years ago
- Tool for extracting information from newly spawned processes☆746Updated 3 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆666Updated 5 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated 8 months ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆744Updated last year
- Linux Exploit Suggester; based on operating system release number☆1,783Updated 10 years ago
- The Damn Vulnerable Router Firmware Project☆681Updated 3 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆809Updated last year
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆208Updated 2 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆953Updated 4 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆972Updated 7 years ago
- ☆1,140Updated 7 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 8 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆888Updated 4 years ago
- DNS Rebinding Exploitation Framework☆488Updated 3 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆709Updated 5 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆560Updated 10 months ago
- Vulnerability Labs for security analysis☆1,165Updated 4 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆381Updated 2 years ago
- Python PTY backdoors - full PTY or nothing!☆742Updated 10 years ago
- My proof-of-concept exploits for the Linux kernel☆1,465Updated 2 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆298Updated 2 years ago
- Micro$oft Windows Hacking Pack☆518Updated 7 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆782Updated last year