Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container
☆15Dec 16, 2017Updated 8 years ago
Alternatives and similar repositories for privesc-CVE-2015-5602
Users that are interested in privesc-CVE-2015-5602 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆11Dec 16, 2017Updated 8 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18May 29, 2020Updated 5 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Apr 23, 2020Updated 6 years ago
- Invokes a Windows Security Login Prompt and outputs the clear text password.☆25Jun 17, 2017Updated 8 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆17May 29, 2015Updated 10 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft☆25May 5, 2022Updated 4 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Payloads for the Hak5 Bash Bunny☆11Apr 2, 2017Updated 9 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Repository for storage of Axon Rapid Response related queries, scripts and more☆10Jul 22, 2025Updated 9 months ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- CVE☆32Oct 20, 2022Updated 3 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- NTPD remote DOS exploit and vulnerable container☆25Oct 30, 2017Updated 8 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 7 years ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Converts and analyzes flight paths for possible surveillance activity - prototype☆24Oct 2, 2017Updated 8 years ago
- Lightweight C# windows agent for Apfell☆17Mar 16, 2020Updated 6 years ago
- Confluence(<install-directory>/confluence/WEB-INF/)文件读取漏洞☆17Sep 2, 2019Updated 6 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Fuzzy test rules (include Sqli xss Lfi and so on)☆17Nov 7, 2017Updated 8 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 4 years ago