forked from jivoi/pentest
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathexploits_list
executable file
·25 lines (17 loc) · 1.39 KB
/
exploits_list
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
https://github.com/SummerWish/linux-exploit-binaries
Linux Kernel < 2.6.22 - ftruncate()/open() Local Exploit| /usr/share/exploitdb/platforms/linux/local/6851.c
Linux Kernel <= 2.6.34-rc3 ReiserFS xattr - Privilege Escalation | /usr/share/exploitdb/platforms/linux/local/12130.py
Linux Kernel < 2.6.36-rc1 CAN BCM - Privilege Escalation Exploit| /usr/share/exploitdb/platforms/linux/local/14814.c
Linux Kernel < 2.6.36-rc4-git2 - x86_64 ia32syscall Emulation Privilege Escalation| /usr/share/exploitdb/platforms/linux/local/15023.c
Linux Kernel < 2.6.36-rc6 pktcdvd Kernel Memory Disclosure| /usr/share/exploitdb/platforms/linux/local/15150.c
Linux Kernel <= 2.6.36-rc8 - RDS Protocol Local Privilege Escalation| /usr/share/exploitdb/platforms/linux/local/15285.c
Linux Kernel < 2.6.36.2 - Econet Privilege Escalation Exploit| /usr/share/exploitdb/platforms/linux/local/17787.c
Linux Kernel <= 2.6.37 - Local Privilege Escalation| /usr/share/exploitdb/platforms/linux/local/15704.c
Linux Kernel 4.4.x (Ubuntu 16.04) - 'double-fdput()' in bpf(BPF_PROG_LOAD) Local Root Exploit| ./linux/local/39772.txt
# An other linux-exploit-binaries
https://github.com/Kabot/Unix-Privilege-Escalation-Exploits-Pack
https://github.com/AusJock/Privilege-Escalation.git
https://github.com/FuzzySecurity/Unix-PrivEsc
https://github.com/bl4ckl1st/godpock
https://www.win.tue.nl/~aeb/linux/hh/hh-12.html
https://www.kernel-exploits.com/