Linux privilege escalation auditing tool
-
Updated
Oct 4, 2022 - Shell
Linux privilege escalation auditing tool
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions
A Windows & Linux pwn library to play with modern C++ - and yeah, it's pwn++, not pwn-- (it's a toy library constantly changing, don't count on it for stability)
Shellcode / Buffer Overflow
Linux Exploit Suggester-2 is a command-line tool that quickly identifies vulnerabilities in Linux systems and suggests exploits to gain access. It supports multiple distributions and has a simple interface for easy use. It is designed for research and educational purposes only and should not be used for illegal activities.
Kernel exploits consisting mostly of privilege escalation attacks against core components of Linux distribtions
Decrypted content of eqgrp-auction-file.tar.xz
Creating covert channels in Linux-based cloud container environments
Linux Binary Exploitation 二进制程式开发入门 (基于linux环境)
Add a description, image, and links to the linux-exploits topic page so that developers can more easily learn about it.
To associate your repository with the linux-exploits topic, visit your repo's landing page and select "manage topics."