Linux privilege escalation auditing tool
-
Updated
Feb 17, 2024 - Shell
Linux privilege escalation auditing tool
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions
pwn++ is a Windows & Linux library oriented for exploit dev but mostly used to play with modern C++ features (17->26)
Shellcode / Buffer Overflow 💣
Decrypted content of eqgrp-auction-file.tar.xz
Notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
Kernel exploits consisting mostly of privilege escalation attacks against core components of Linux distribtions
Linux Exploit Suggester-2 is a command-line tool that quickly identifies vulnerabilities in Linux systems and suggests exploits to gain access. It supports multiple distributions and has a simple interface for easy use. It is designed for research and educational purposes only and should not be used for illegal activities.
EDUCATIONAL PURPOSES ONLY! Linux/x64 reverse TCP shell exploit via ELF memory processing
Creating covert channels in Linux-based cloud container environments
Linux Binary Exploitation 二进制程式开发入门 (基于linux环境)
Add a description, image, and links to the linux-exploits topic page so that developers can more easily learn about it.
To associate your repository with the linux-exploits topic, visit your repo's landing page and select "manage topics."