My proof-of-concept exploits for the Linux kernel
-
Updated
Mar 31, 2022 - C
My proof-of-concept exploits for the Linux kernel
Local privilege escalation via PetitPotam (Abusing impersonate privileges).
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM
Linux kernel module implementation & exploitation (pwn) labs.
Example on how to write a Linux driver
arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system
Scripted Linux Privilege Escalation for the CVE-2022-0847 "Dirty Pipe" vulnerability
Brahma - Privilege elevation exploit for Nintendo 3DS
WallEscape vulnerability in util-linux
VM Escape for Parallels Desktop <18.1.1
Tools to bypass flawed SELinux policies using the init_module system call
stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system
Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.
ESTHER's a native enumeration tool for GNU/Linux Privilege Escalation
windows Local privilege escalation for xp sp3+ (x86/x64)
All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs
Small and simple tool for privilege escalation
Add a description, image, and links to the privilege-escalation topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation topic, visit your repo's landing page and select "manage topics."