cve-2021-3560
Here are 11 public repositories matching this topic...
A number of exploits and tools I've written for CVEs accredited to Marshall Whittaker/oxagast
-
Updated
Jul 18, 2024 - Python
© 哨兵博客 V3 Power by Bin4xin | Jekyll | Github Action.
-
Updated
Jul 22, 2024 - CSS
Exploitation of the CVE-2021-3560 polkit vulnerability
-
Updated
Jun 30, 2024
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
-
Updated
Mar 12, 2024 - Go
哨兵博客主页源码
-
Updated
Jul 22, 2024
Exploit for CVE-2021-3560 (Polkit) - Local Privilege Escalation
-
Updated
Jun 26, 2022 - Python
Scripted Linux Privilege Escalation for the CVE-2022-0847 "Dirty Pipe" vulnerability
-
Updated
Apr 18, 2022 - C
f4T1H's PoC script for CVE-2021-3560 Polkit D-Bus Privilege Escalation
-
Updated
Feb 13, 2022 - Shell
CVE-2021-3560 Local PrivEsc Exploit
-
Updated
Jun 12, 2021 - Shell
Improve this page
Add a description, image, and links to the cve-2021-3560 topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the cve-2021-3560 topic, visit your repo's landing page and select "manage topics."