My proof-of-concept exploits for the Linux kernel
-
Updated
Mar 31, 2022 - C
My proof-of-concept exploits for the Linux kernel
Local privilege escalation via PetitPotam (Abusing impersonate privileges).
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
Linux kernel module implementation & exploitation (pwn) labs.
Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM
arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system
WallEscape vulnerability in util-linux
Tools to bypass flawed SELinux policies using the init_module system call
Example on how to write a Linux driver
VM Escape for Parallels Desktop <18.1.1
Brahma - Privilege elevation exploit for Nintendo 3DS
All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs
Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.
[Feature complete] A simpler alternative to sudo and doas
windows Local privilege escalation for xp sp3+ (x86/x64)
stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system
ESTHER's a native enumeration tool for GNU/Linux Privilege Escalation
Scripted Linux Privilege Escalation for the CVE-2022-0847 "Dirty Pipe" vulnerability
Small and simple tool for privilege escalation
Add a description, image, and links to the privilege-escalation topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation topic, visit your repo's landing page and select "manage topics."