- Yangon, Myanmar (Burma)
-
03:05
(UTC +06:30) - @r1skkam
- in/r1skkam
Exploit
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public expl…
[Linux] Two Privilege Escalation techniques abusing sudo token
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Python exploit code for CVE-2021-4034 (pwnkit)
windows-kernel-exploits Windows平台提权漏洞集合
CVE-2023-38831 winrar exploit generator
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 9…
Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604)
The Dom amongst the Flipper Zero Firmware. Give your Flipper the power and freedom it is really craving. Let it show you its true form. Dont delay, switch to the one and only true Master today!
notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation
Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)
Slides & Code snippets for a workshop held @ x33fcon 2024
HookChain: A new perspective for Bypassing EDR Solutions
A Post-exploitation Toolset for Interacting with the Microsoft Graph API