yunchih / static-binariesLinks
A set of commonly-used static binaries
☆202Updated last year
Alternatives and similar repositories for static-binaries
Users that are interested in static-binaries are comparing it to the libraries listed below
Sorting:
- static binaries linux i386☆116Updated 10 years ago
- ☆143Updated 2 years ago
- CVE-2022-0185☆377Updated 3 years ago
- Collection of Statically linked binaries for Linux. Suited for Forensics☆185Updated 6 months ago
- Tool to test if you're in a Docker container and attempt simple breakouts☆150Updated 3 years ago
- Linux kernel XFRM UAF poc (3.x - 5.x kernels)☆137Updated 5 years ago
- A collection of statically compiled tools like Nmap and Socat.☆477Updated last year
- Linux privilege escalation via LXD☆141Updated 5 years ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆99Updated 5 years ago
- SOCKS5 and HTTP over TURN/STUN proxy☆194Updated 2 years ago
- ☆67Updated 4 years ago
- ☆310Updated 2 years ago
- Linux 4.10 < 5.1.17 PTRACE_TRACEME local root☆328Updated 6 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 5 years ago
- Shocker / Docker Breakout PoC☆121Updated 11 years ago
- CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻☆224Updated 4 years ago
- Exploit for CVE-2021-25741 vulnerability☆28Updated 3 years ago
- Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)☆207Updated 6 years ago
- A penetration toolkit for container environment☆118Updated this week
- chw00t - Unices chroot breaking tool☆613Updated 6 years ago
- Linux kernel exploits for local privilege escalation☆81Updated 7 years ago
- A beginner-friendly CTF about Kubernetes security.☆80Updated 3 years ago
- PoC for CVE-2019-5736☆654Updated 4 years ago
- Information about Kubernetes CVE-2020-8558, including proof of concept exploit.☆43Updated 5 years ago
- Linux post exploitation privilege escalation enumeration☆257Updated 5 years ago
- PoC for CVE-2021-3156 (sudo heap overflow)☆434Updated 3 years ago
- Script to recover mt_rand()'s seed with only two outputs and without any bruteforce.☆159Updated 6 years ago
- An intentionally vulnerable NGINX setup☆243Updated 5 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆345Updated 3 years ago
- A Python implementation that facilitates finding timeless timing attack vulnerabilities.☆129Updated 8 months ago