Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container
☆15Dec 16, 2017Updated 8 years ago
Alternatives and similar repositories for privesc-CVE-2015-5602
Users that are interested in privesc-CVE-2015-5602 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆10Dec 16, 2017Updated 8 years ago
- Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container☆32Apr 7, 2018Updated 8 years ago
- ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container☆147Apr 7, 2018Updated 8 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Apr 23, 2020Updated 5 years ago
- Invokes a Windows Security Login Prompt and outputs the clear text password.☆25Jun 17, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An Intro to Penetration Testing Workshop☆15May 31, 2018Updated 7 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 6 years ago
- ☆17May 29, 2015Updated 10 years ago
- This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft☆25May 5, 2022Updated 3 years ago
- Payloads for the Hak5 Bash Bunny☆11Apr 2, 2017Updated 9 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆41May 14, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- CVE☆32Oct 20, 2022Updated 3 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 7 years ago
- ☆12Feb 16, 2017Updated 9 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆15Mar 2, 2014Updated 12 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Apr 15, 2020Updated 6 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- minimalist sudo alternative: multi-user privilege escalation tool in three letters☆10Jul 5, 2022Updated 3 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 9 months ago
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆12Jul 14, 2023Updated 2 years ago
- Dirtycow exploit for both 32 and 64-bit☆29Jul 23, 2018Updated 7 years ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 18, 2020Updated 5 years ago