Linux privilege escalation auditing tool
-
Updated
Feb 17, 2024 - Shell
Linux privilege escalation auditing tool
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions
pwn++ is a Windows & Linux library oriented for exploit dev and used to play with Modern C++ (17->26)
Shellcode / Buffer Overflow 💣
Decrypted content of eqgrp-auction-file.tar.xz
Linux Exploit Suggester-2 is a command-line tool that quickly identifies vulnerabilities in Linux systems and suggests exploits to gain access. It supports multiple distributions and has a simple interface for easy use. It is designed for research and educational purposes only and should not be used for illegal activities.
Kernel exploits consisting mostly of privilege escalation attacks against core components of Linux distribtions
EDUCATIONAL PURPOSES ONLY! Linux/x64 reverse TCP shell exploit via ELF memory processing
Creating covert channels in Linux-based cloud container environments
Notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
Linux Binary Exploitation 二进制程式开发入门 (基于linux环境)
Add a description, image, and links to the linux-exploits topic page so that developers can more easily learn about it.
To associate your repository with the linux-exploits topic, visit your repo's landing page and select "manage topics."