linux-exploits

There are 13 repositories under linux-exploits topic.

  • The-Z-Labs/linux-exploit-suggester

    Linux privilege escalation auditing tool

    Language:Shell5.6k127291.1k
  • SUDO_KILLER

    TH3xACE/SUDO_KILLER

    A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.

    Language:Shell2.2k4911252
  • machine1337/gmailc2

    A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions

    Language:Python45110063
  • pwn--

    hugsy/pwn--

    pwn++ is a Windows & Linux library oriented for exploit dev but mostly used to play with modern C++ features (17->26)

    Language:C++1205715
  • sectool/Python-Shellcode-Buffer-Overflow

    Shellcode / Buffer Overflow 💣

    Language:Python18108
  • MadExploits/Privelege-escalation

    Localroot Privelege escalation for linux

    Language:C7107
  • NoahGWood/EQGRP

    Decrypted content of eqgrp-auction-file.tar.xz

    Language:Perl6202
  • dubniczky/Kernel-Exploits

    Kernel exploits consisting mostly of privilege escalation attacks against core components of Linux distribtions

    Language:C2200
  • xzbot

    R4GN4R0K-SEC/xzbot

    Notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)

    Language:Go200
  • bsteen/cloud-covert-channels

    Creating covert channels in Linux-based cloud container environments

    Language:C1402
  • Qyfashae/memfd_create_2023_Exploit

    EDUCATIONAL PURPOSES ONLY! Linux/x64 reverse TCP shell exploit via ELF memory processing

    Language:Python1100
  • sujayadkesar/linux-exploit-suggester-2

    Linux Exploit Suggester-2 is a command-line tool that quickly identifies vulnerabilities in Linux systems and suggests exploits to gain access. It supports multiple distributions and has a simple interface for easy use. It is designed for research and educational purposes only and should not be used for illegal activities.

    Language:Perl110
  • JohnRyk/BinExp

    Linux Binary Exploitation 二进制程式开发入门 (基于linux环境)

    Language:C0100