🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
-
Updated
Feb 15, 2023 - C
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan
This repo has been migrated to https://github.com/github/security-lab/tree/master/SecurityExploits
collection of verified Linux kernel exploits
Localroot-ALL-CVE~
Collection of things made during my preparation to take on OSEE
A Log4j writeup and Docker based PoC written in PowerShell
Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.
All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs
Exploitation on different architectures (x86, x64, arm, mips, avr)
#INFILTRATE19 raptor's party pack.
#INFILTRATE20 raptor's party pack.
Cheat software for Counter Strike Global Offensive [CS:GO], To be finished later as I'm moving on to cs2
Created by The cybersecurity community