Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for vulnerabilities privilege escalation
privilege-escalation
x
vulnerabilities
x
6 search results found
Payloadsallthethings
⭐
55,999
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Linux Kernel Exploitation
⭐
5,116
A collection of links related to Linux kernel security and exploitation
Cdk
⭐
3,267
📦 Make security testing of K8s, Docker, and Containerd easier.
A Red Teamer Diaries
⭐
1,294
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Metarget
⭐
957
Metarget is a framework providing automatic constructions of vulnerable infrastructures.
Awesome Cyber Security
⭐
255
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
Mida Multitool
⭐
140
Bash script purposed for system enumeration, vulnerability identification and privilege escalation.
Writeups
⭐
133
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Security Research
⭐
84
Security Research
Cve 2020 1034
⭐
81
PoC demonstrating the use of cve-2020-1034 for privilege escalation
Cve 2023 22515
⭐
62
CVE-2023-22515: Confluence Broken Access Control Exploit
Advisories
⭐
21
A collection of my public security advisories.
Aio Pentesting
⭐
15
All in one Pentest methodologies - Tools and commands | Where compiled all common materials for pentester
Confluence Hack
⭐
14
CVE-2023-22515
Docker Privesc
⭐
12
Privilege escalation in Docker
Win Localpriv Escalation Polarbear
⭐
12
Windows Local Privilege Escalation - 0 Day Vulnerability (schtasks.exe) released by @SandboxEscaper :)
Shotovuln
⭐
12
An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.
Sharpbyebear
⭐
8
AppXSVC Service race condition - privilege escalation
Privesc Cve 2015 5602
⭐
7
Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container
Pentesting Methodology
⭐
6
When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to help while on a Pentest/CTF.
Privesc Cve 2010 0426
⭐
5
Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container
Aymansecnotes
⭐
5
This repository contains all my notes. Feel free to use them, share them or modify them.
Related Searches
Security Vulnerabilities (12,350)
Laravel Vulnerabilities (11,319)
Php Vulnerabilities (8,887)
Html Vulnerabilities (1,815)
Javascript Vulnerabilities (1,306)
Python Vulnerabilities (1,159)
Vulnerabilities Scanner (695)
Vulnerabilities Exploitation (636)
1-6 of 6 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.