Jump to content
Nytro

PrivEsc exploits

Recommended Posts

Posted

[h=1]exploits[/h] Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.

To check md5sum in linux, type md5sum -c md5sum.txt

[h=3][/h][h=3]Linux[/h] [TABLE]

[TR]

[TH=align: left]Where[/TH]

[TH=align: left]Type[/TH]

[TH=align: left]Platform[/TH]

[TH=align: left]Sploit[/TH]

[TH=align: left]Dir[/TH]

[TH=align: left]Lang[/TH]

[/TR]

[TR]

[TD=align: left]Both[/TD]

[TD=align: left]Exploit Finder[/TD]

[TD=align: left]Linux[/TD]

[TD=align: left]n/a[/TD]

[TD=align: left]/lin/suggest_exploit.pl[/TD]

[TD=align: left]Perl[/TD]

[/TR]

[TR]

[TD=align: left]Both[/TD]

[TD=align: left]Priv Esc[/TD]

[TD=align: left]Linux[/TD]

[TD=align: left]Exim 4.69[/TD]

[TD=align: left]/lin/pe-exim4[/TD]

[TD=align: left]Perl[/TD]

[/TR]

[TR]

[TD=align: left]Local[/TD]

[TD=align: left]Priv Esc[/TD]

[TD=align: left]Linux[/TD]

[TD=align: left]Kernel <= 2.6.36-rc8[/TD]

[TD=align: left]/lin/pe-kernel-rds[/TD]

[TD=align: left]C[/TD]

[/TR]

[TR]

[TD=align: left]Local[/TD]

[TD=align: left]Priv Esc[/TD]

[TD=align: left]Linux[/TD]

[TD=align: left]Kernel <= 3.2.2[/TD]

[TD=align: left]/lin/pe-memodipper[/TD]

[TD=align: left]C[/TD]

[/TR]

[/TABLE]

[h=3][/h][h=3]Windows[/h] [TABLE]

[TR]

[TH=align: left]Where[/TH]

[TH=align: left]Type[/TH]

[TH=align: left]Platform[/TH]

[TH=align: left]Sploit[/TH]

[TH=align: left]Dir[/TH]

[TH=align: left]Lang[/TH]

[/TR]

[TR]

[TD=align: left]Remote[/TD]

[TD=align: left]Buffer Overflow[/TD]

[TD=align: left]Windows XP SP2[/TD]

[TD=align: left]War-FTP 1.65[/TD]

[TD=align: left]/win/bof-warftp[/TD]

[TD=align: left]Python[/TD]

[/TR]

[TR]

[TD=align: left]Remote[/TD]

[TD=align: left]Buffer Overflow[/TD]

[TD=align: left]Windows XP SP1[/TD]

[TD=align: left]CesarFTP 0.99g[/TD]

[TD=align: left]/win/bof-cesarftp[/TD]

[TD=align: left]Python[/TD]

[/TR]

[TR]

[TD=align: left]Remote[/TD]

[TD=align: left]Buffer Overflow[/TD]

[TD=align: left]Windows 7 SP1 - 6.1.7601[/TD]

[TD=align: left]SL Mail[/TD]

[TD=align: left]/win/slmail[/TD]

[TD=align: left]Python[/TD]

[/TR]

[TR]

[TD=align: left]Local[/TD]

[TD=align: left]Priv Esc[/TD]

[TD=align: left]Windows (all up to 7 SP1?)[/TD]

[TD=align: left]KiTrap0D[/TD]

[TD=align: left]/win/pe-kitrap[/TD]

[TD=align: left]v C++[/TD]

[/TR]

[TR]

[TD=align: left]Local[/TD]

[TD=align: left]Priv Esc[/TD]

[TD=align: left]Windows (2k XP 03 - all)[/TD]

[TD=align: left]keybd_event[/TD]

[TD=align: left]/win/pe-keybd-event[/TD]

[TD=align: left]C[/TD]

[/TR]

[TR]

[TD=align: left]Local[/TD]

[TD=align: left]Priv Esc[/TD]

[TD=align: left]Windows (XP SP3 & 03 SP2/3)[/TD]

[TD=align: left]AFD.sys[/TD]

[TD=align: left]/win/pe-afd[/TD]

[TD=align: left]Python .exe[/TD]

[/TR]

[/TABLE]

[h=3]To-do[/h] [TABLE]

[TR]

[TH=align: left]Where[/TH]

[TH=align: left]Type[/TH]

[TH=align: left]Platform[/TH]

[TH=align: left]Sploit[/TH]

[TH=align: left]Dir[/TH]

[TH=align: left]Lang[/TH]

[/TR]

[TR]

[TD=align: left]x[/TD]

[TD=align: left]x[/TD]

[TD=align: left]x[/TD]

[TD=align: left]x[/TD]

[TD=align: left]x[/TD]

[TD=align: left]x[/TD]

[/TR]

[/TABLE]

Sursa: https://github.com/tresacton/exploits

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...