toffan / binfmt_miscLinks
Kernel Support for miscellaneous (your favourite) exploits
☆22Updated 8 years ago
Alternatives and similar repositories for binfmt_misc
Users that are interested in binfmt_misc are comparing it to the libraries listed below
Sorting:
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆59Updated 2 years ago
- Loads a custom dll in system32 via diaghub.☆77Updated 5 years ago
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Updated 3 years ago
- A mirror of several precompiled standalone red-teaming tools.☆18Updated 2 years ago
- Proof-of-concept code for various bugs☆112Updated 10 months ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Updated 5 years ago
- ☆72Updated last year
- Privilege escalation using dmidecode☆20Updated 6 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆26Updated 2 years ago
- Vulnerabilities, exploits, and PoCs☆37Updated 3 months ago
- ☆51Updated 3 years ago
- LDAP Swiss Army Knife☆49Updated last year
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- ☆27Updated 2 years ago
- Simple tool/script for generating malicious Linux shared libraries☆35Updated 4 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 5 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 4 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16Updated 3 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 4 years ago
- A python-based padding oracle tool☆20Updated last year
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆121Updated 3 years ago
- named pipe server with impersonation☆59Updated 6 years ago
- ☆52Updated 4 years ago
- A red team emulation tool deveoped by CyCraft Technology☆25Updated last year
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated last year
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- Vulnerable docker images for CVE-2021-41773☆21Updated 3 years ago
- Linux privilege escalation via LXD☆139Updated 5 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Updated 3 years ago