spencerdodd / kernelpopLinks
kernel privilege escalation enumeration and exploitation framework
☆690Updated 6 years ago
Alternatives and similar repositories for kernelpop
Users that are interested in kernelpop are comparing it to the libraries listed below
Sorting:
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆977Updated 7 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆669Updated 6 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆726Updated 7 years ago
- Payload Development Framework☆752Updated this week
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆749Updated 6 years ago
- Python PTY backdoors - full PTY or nothing!☆745Updated 10 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆887Updated 5 years ago
- Interactive shellcoding environment to easily craft shellcodes☆894Updated 4 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆563Updated last year
- Linux Exploit Suggester; based on operating system release number☆1,791Updated 11 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆493Updated 3 years ago
- Post Exploitation Collection☆1,562Updated 5 years ago
- ☆1,155Updated 8 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆746Updated last year
- My proof-of-concept exploits for the Linux kernel☆1,472Updated 3 years ago
- Some of my exploits.☆582Updated 4 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆956Updated 4 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆812Updated 2 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆301Updated 2 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆715Updated 6 years ago
- Tool for extracting information from newly spawned processes☆757Updated 3 weeks ago
- A shellcode writing toolkit☆670Updated 3 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆325Updated 4 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆333Updated 2 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,062Updated 5 years ago
- Vulnerability Labs for security analysis☆1,172Updated 4 years ago
- Local UNIX PrivEsc Aggregation☆245Updated 9 years ago
- The Damn Vulnerable Router Firmware Project☆688Updated 4 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Updated 7 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,007Updated 6 years ago