spencerdodd / kernelpop
kernel privilege escalation enumeration and exploitation framework
☆689Updated 6 years ago
Alternatives and similar repositories for kernelpop:
Users that are interested in kernelpop are comparing it to the libraries listed below
- Payload development framework☆708Updated last month
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆973Updated 7 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆725Updated 7 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆666Updated 5 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆710Updated 5 years ago
- Some of my exploits.☆576Updated 4 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆888Updated 4 years ago
- fireELF - Fileless Linux Malware Framework☆662Updated 5 years ago
- Vulnerability Labs for security analysis☆1,167Updated 4 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆746Updated 6 years ago
- ☆1,142Updated 7 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆380Updated 2 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆745Updated last year
- Windows / Linux Local Privilege Escalation Workshop☆1,006Updated 6 years ago
- Python PTY backdoors - full PTY or nothing!☆742Updated 10 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆208Updated 2 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆809Updated last year
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆489Updated 3 years ago
- Interactive shellcoding environment to easily craft shellcodes☆893Updated 4 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆325Updated 3 years ago
- PwnWiki - The notes section of the pentesters mind.☆560Updated 6 years ago
- Linux Exploit Suggester; based on operating system release number☆1,783Updated 10 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆571Updated 10 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆573Updated 9 months ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆560Updated 10 months ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆390Updated 7 years ago
- The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers☆454Updated 2 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated 8 months ago
- Post Exploitation Wiki☆516Updated 5 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,209Updated 4 years ago