Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container
☆15Dec 16, 2017Updated 8 years ago
Alternatives and similar repositories for privesc-CVE-2015-5602
Users that are interested in privesc-CVE-2015-5602 are comparing it to the libraries listed below
Sorting:
- An Intro to Penetration Testing Workshop☆15May 31, 2018Updated 7 years ago
- ☆17May 29, 2015Updated 10 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18May 29, 2020Updated 5 years ago
- Converts and analyzes flight paths for possible surveillance activity - prototype☆24Oct 2, 2017Updated 8 years ago
- CVE☆32Oct 20, 2022Updated 3 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- ☆12Feb 16, 2017Updated 9 years ago
- A Layer-7 HTTP DOS tool☆10Jul 12, 2018Updated 7 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- Case study and POC of CVE-2017-12635: Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation☆10Dec 15, 2019Updated 6 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 6 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Polymorphic Virus in Python☆10Feb 8, 2023Updated 3 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- minimalist sudo alternative: multi-user privilege escalation tool in three letters☆10Jul 5, 2022Updated 3 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- ☆14Mar 31, 2015Updated 10 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- Piet language in Ruby☆13Nov 12, 2024Updated last year
- w4b-file : WebFile Analyzer is an advanced command-line utility meticulously crafted for web developers, security professionals, and rese…☆11Nov 16, 2023Updated 2 years ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 12 years ago
- A python RCE exploit on QNAP-QTS☆14Sep 15, 2020Updated 5 years ago
- Tracking Google Enterprise Android Devices☆21Updated this week
- Zac's assorted config files☆10Jan 11, 2017Updated 9 years ago
- My lab notes and learning progress for the PortSwigger Web Security Academy's SQL Injection chapter.☆12Aug 10, 2023Updated 2 years ago
- Analizador de tráfico para dispositivos Android potencialmente comprometidos como parte de una botnet orientado a detectar ataques DDoS.☆13Jun 20, 2018Updated 7 years ago
- ☆10Jun 30, 2022Updated 3 years ago
- This is a library for stealing browser passwords, crypto stuff, password manager extension stuff, and just general applications too☆11May 10, 2024Updated last year
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- ☆11Jul 16, 2018Updated 7 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year
- Testing new resource style☆10Nov 20, 2024Updated last year
- OSCP Prep notes☆14Oct 18, 2020Updated 5 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- This is a termux sms booming tool☆11Aug 20, 2023Updated 2 years ago