Linux privilege escalation auditing tool
-
Updated
Mar 20, 2026 - Shell
Linux privilege escalation auditing tool
K8ε·₯ε ·ει(ε η½ζΈι/ζζε·₯ε ·/θΏη¨ζΊ’εΊ/ζΌζ΄ε©η¨/ζ«ζε·₯ε ·/ε―η η ΄θ§£/ε ζε·₯ε ·/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
Windows Local Privilege Escalation Cookbook
Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463
Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527
Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)
collection of verified Linux kernel exploits
Blue Hammer by Nightmare-Eclipse Vulnerability Documentation & Reimplementation.
Windows MSI Installer LPE (CVE-2021-43883)
Linux & Android Kernel Vulnerability research and exploitation
PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527
WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)
A Linux Privilege Escalation cheat sheet I made prepping for the OSCP that has mophored into the most comprehensive, specific Linux PrivEsc reference online : )
CVE-2021-4034: Local Privilege Escalation in polkit's pkexec proof of concept
Add a description, image, and links to the lpe topic page so that developers can more easily learn about it.
To associate your repository with the lpe topic, visit your repo's landing page and select "manage topics."