K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
-
Updated
Jan 25, 2025 - PowerShell
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
Windows Local Privilege Escalation Cookbook
Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463
Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527
Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)
collection of verified Linux kernel exploits
Windows MSI Installer LPE (CVE-2021-43883)
PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527
Linux & Android Kernel Vulnerability research and exploitation
WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)
CVE-2021-4034: Local Privilege Escalation in polkit's pkexec proof of concept
Exploits R&D
命令行版向日葵RCE漏洞利用工具 / cmd version of sunlogin exploit tool
Speeding up identifying which binaries with a SUID flag may lead to root access
Add a description, image, and links to the lpe topic page so that developers can more easily learn about it.
To associate your repository with the lpe topic, visit your repo's landing page and select "manage topics."