https://github.com/notselwyn/exploits
Custom exploits
https://github.com/notselwyn/exploits
exploit linux proof-of-concept
Last synced: 4 months ago
JSON representation
Custom exploits
- Host: GitHub
- URL: https://github.com/notselwyn/exploits
- Owner: Notselwyn
- License: apache-2.0
- Created: 2022-10-12T17:55:04.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2024-04-08T18:44:54.000Z (about 1 year ago)
- Last Synced: 2024-11-07T09:17:07.740Z (6 months ago)
- Topics: exploit, linux, proof-of-concept
- Language: Python
- Homepage:
- Size: 65.4 KB
- Stars: 20
- Watchers: 3
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# exploits
Custom exploits## List
- [`CVE-2024-1086`](https://github.com/notselwyn/CVE-2024-1086): Linux Kernel double-free (version v3.15 < v6.8) leading to namespace escape + privesc to root
- [`CVE-2023-3866.py`](CVE-2023-3866/CVE-2023-3866.py): Linux Kernel remote NULL Pointer Dereference DoS
- [`CVE-2023-3865.py`](CVE-2023-3865/CVE-2023-3865.py): Linux Kernel remote Out-Of-Bounds 64KiB Read Information Disclosure
- [`CVE-2022-47758.md`](CVE-2022-47758/CVE-2022-47758.md): Unauthenticated RCE in Nanoleaf firmware <= v7.1.1 (inclusive) through DNS hijacking + MQTT
- [`CVE-2022-46640.py`](CVE-2022-46640/CVE-2022-46640.py): Unauthenticated RCE in Nanoleaf Desktop App < v1.3.1 (exclusive) through a HTTP request## Why?
hurr hurr haha exploit go brrrrrrrr## Disclaimer
The programs and scripts ("programs") in this software directory/folder/repository ("repository") are published, developed and distributed for educational purposes only. I ("the creator") do not condone any malicious or illegal usage of the programs in this repository, as the intend is sharing research and not condoning illegal activities. The reason in the "why?" section above are for satirical purposes only. I am not legally responsible for anything you do with the programs in this repository.