spencerdodd / kernelpopLinks
kernel privilege escalation enumeration and exploitation framework
☆698Updated 7 years ago
Alternatives and similar repositories for kernelpop
Users that are interested in kernelpop are comparing it to the libraries listed below
Sorting:
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆677Updated 6 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆976Updated 7 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆382Updated 2 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆493Updated 4 years ago
- Python PTY backdoors - full PTY or nothing!☆749Updated 11 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Updated 7 years ago
- Micro$oft Windows Hacking Pack☆524Updated 7 years ago
- Vulnerability Labs for security analysis☆1,174Updated 4 years ago
- A shellcode writing toolkit☆681Updated 3 months ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆719Updated 6 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆890Updated 5 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆328Updated 4 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,007Updated 6 years ago
- Interactive shellcoding environment to easily craft shellcodes☆903Updated 4 years ago
- PwnWiki - The notes section of the pentesters mind.☆564Updated 7 years ago
- Pop shells like a master.☆1,472Updated 6 years ago
- Automatically exported from code.google.com/p/unix-privesc-check☆1,070Updated 4 years ago
- Payload Development Framework☆810Updated last week
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆655Updated last year
- Local UNIX PrivEsc Aggregation☆244Updated 9 years ago
- Post Exploitation Collection☆1,565Updated 5 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated last year
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆756Updated 6 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆743Updated last year
- Automated script for performing Padding Oracle attacks☆795Updated last year
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆568Updated last year
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆259Updated 4 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆208Updated 3 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆393Updated 8 years ago
- All my infosec notes I have been building up over the years☆333Updated 8 months ago