Brahma - Privilege elevation exploit for Nintendo 3DS
-
Updated
May 12, 2016 - C
Brahma - Privilege elevation exploit for Nintendo 3DS
windows Local privilege escalation for xp sp3+ (x86/x64)
Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM
ESTHER's a native enumeration tool for GNU/Linux Privilege Escalation
Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.
Small and simple tool for privilege escalation
stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
[Feature complete] Edit a file that requires root access
arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system
Linux kernel module implementation & exploitation (pwn) labs.
CVE-2021-4034 pkexec - Linux Local Privilege Escalation
My proof-of-concept exploits for the Linux kernel
Scripted Linux Privilege Escalation for the CVE-2022-0847 "Dirty Pipe" vulnerability
Example on how to write a Linux driver
Proof-of-Concept of the ZombieLoad-Attack for a demonstration on Intel's i7-7700k using Windows 10 Pro
[Feature complete] A simpler alternative to sudo and doas
PrivEsc using Process Token Impersonation - Search all Processes
Add a description, image, and links to the privilege-escalation topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation topic, visit your repo's landing page and select "manage topics."