Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitation methods(which are CVE-independent.)
☆35Nov 26, 2016Updated 9 years ago
Alternatives and similar repositories for Privilege-Escalation-Framework
Users that are interested in Privilege-Escalation-Framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Modify data structures in the Windows kernel, hiding processes by PID☆16Oct 29, 2017Updated 8 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Aug 18, 2019Updated 6 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆13Aug 31, 2017Updated 8 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A DIY project to show failed ssh login attempts on a map in real-time☆11Apr 22, 2025Updated last year
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆15Dec 8, 2019Updated 6 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 9 years ago
- Java Swing GUI for decoding/encoding AMD GPU VRAM timings☆20Apr 21, 2019Updated 7 years ago
- Missing addon manager for firefox☆17Aug 3, 2023Updated 2 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆202Nov 8, 2020Updated 5 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- ☆47Jun 14, 2018Updated 7 years ago
- Manual PE image mapper☆65Aug 29, 2013Updated 12 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆265Jul 6, 2017Updated 8 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- Experiments in trying to find 0-days in numpy☆38Jul 1, 2017Updated 8 years ago
- Repository containing many useful scripts☆75Mar 30, 2022Updated 4 years ago
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆183Mar 30, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆24Sep 25, 2018Updated 7 years ago
- Privilege escalation using dmidecode☆21May 6, 2019Updated 7 years ago
- Execute an arbitrary command within the context of another process☆20Jun 28, 2019Updated 6 years ago
- SmartAdBlock project☆30Jan 9, 2020Updated 6 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- The Demo for CVE-2018-1000006☆39Jan 25, 2018Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆50Apr 6, 2018Updated 8 years ago
- Win32 PE Anti-RE and Anti-debugging Framework☆13May 14, 2019Updated 6 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago
- Full chain Chrome 71.0.3578.98 exploit☆22Jul 18, 2021Updated 4 years ago
- ACT documentation repo☆17May 22, 2024Updated last year
- Browser userscript to clean up hyperlink redirections and link shims☆21Apr 12, 2026Updated 3 weeks ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆33Oct 7, 2024Updated last year