Decrypted content of eqgrp-auction-file.tar.xz
-
Updated
Apr 11, 2017 - Perl
Decrypted content of eqgrp-auction-file.tar.xz
Shellcode / Buffer Overflow 💣
Linux Binary Exploitation 二进制程式开发入门 (基于linux环境)
Creating covert channels in Linux-based cloud container environments
Kernel exploits consisting mostly of privilege escalation attacks against core components of Linux distribtions
Linux Exploit Suggester-2 is a command-line tool that quickly identifies vulnerabilities in Linux systems and suggests exploits to gain access. It supports multiple distributions and has a simple interface for easy use. It is designed for research and educational purposes only and should not be used for illegal activities.
A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions
EDUCATIONAL PURPOSES ONLY! Linux/x64 reverse TCP shell exploit via ELF memory processing
Linux privilege escalation auditing tool
Notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
pwn++ is a Windows & Linux library oriented for exploit dev and used to play with Modern C++ (17->26)
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
Add a description, image, and links to the linux-exploits topic page so that developers can more easily learn about it.
To associate your repository with the linux-exploits topic, visit your repo's landing page and select "manage topics."