Notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
-
Updated
Apr 1, 2024 - Go
Notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
Linux Binary Exploitation 二进制程式开发入门 (基于linux环境)
Linux Exploit Suggester-2 is a command-line tool that quickly identifies vulnerabilities in Linux systems and suggests exploits to gain access. It supports multiple distributions and has a simple interface for easy use. It is designed for research and educational purposes only and should not be used for illegal activities.
Kernel exploits consisting mostly of privilege escalation attacks against core components of Linux distribtions
EDUCATIONAL PURPOSES ONLY! Linux/x64 reverse TCP shell exploit via ELF memory processing
Creating covert channels in Linux-based cloud container environments
Decrypted content of eqgrp-auction-file.tar.xz
Shellcode / Buffer Overflow 💣
pwn++ is a Windows & Linux library oriented for exploit dev and used to play with Modern C++ (17->26)
A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
Linux privilege escalation auditing tool
Add a description, image, and links to the linux-exploits topic page so that developers can more easily learn about it.
To associate your repository with the linux-exploits topic, visit your repo's landing page and select "manage topics."