privelage-escalation
Here are 22 public repositories matching this topic...
📦 An independent package manager that every hacker deserves.
-
Updated
May 26, 2024 - Rust
Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing
-
Updated
Jun 15, 2023
Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.
-
Updated
Jul 16, 2023
Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration testing training.
-
Updated
Sep 15, 2022 - PHP
POC OF CVE-2022-21970
-
Updated
Oct 20, 2022 - JavaScript
A privilege escalation detection and prevention system for GNU/Linux hosts
-
Updated
Apr 28, 2012 - C
C2 Server for pentesting, exploitation, and payload creation
-
Updated
Jul 17, 2024
Collection of notes that I have gathered during my studies for the Certified Red Team Professional (CRTP) exam.
-
Updated
Oct 27, 2024
XMR Miner Malware
-
Updated
Oct 10, 2023 - Python
Helper script for checking SUID/SUDO permissions against GTFOBin data.
-
Updated
Jan 30, 2024 - Python
A Command And Control Server + Worm
-
Updated
Jul 20, 2023 - Python
Trusted Installer DO
-
Updated
Sep 18, 2024 - PowerShell
XMR Ransomware
-
Updated
Jul 24, 2023 - Python
Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python
-
Updated
Oct 17, 2025 - Python
Brief overview of how I solved the first PWN CTF Challenge for my Ethical Penetration Testing course.
-
Updated
Nov 8, 2022
A Deatiled CTF wlkthoughs & Writeups
-
Updated
Sep 4, 2024
This repository contains a Proof-of-Concept (PoC) exploit for the Baron Samedit vulnerability (CVE-2021-3156). The exploit demonstrates privilege escalation on Ubuntu 20.04 with sudo version 1.8.31 and glibc version 2.31. It includes an assembly-based exploit, a shared object payload, and a Makefile for automated compilation.
-
Updated
Feb 11, 2025 - Assembly
FaultLine is a personal hacking toolkit I’ve been building to help with everything from network recon to exploitation and post-exploitation. It started as a way to make my own bug bounty hunting and red team work faster and more efficient. It's not perfect and still a work in progress.
-
Updated
Nov 14, 2025 - Shell
Improve this page
Add a description, image, and links to the privelage-escalation topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the privelage-escalation topic, visit your repo's landing page and select "manage topics."