Linux privilege escalation auditing tool
-
Updated
Feb 13, 2026 - Shell
Linux privilege escalation auditing tool
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
Windows Local Privilege Escalation Cookbook
Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463
Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527
Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)
collection of verified Linux kernel exploits
Windows MSI Installer LPE (CVE-2021-43883)
Linux & Android Kernel Vulnerability research and exploitation
PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527
WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)
A Linux Privilege Escalation cheat sheet I made prepping for the OSCP that has mophored into the most comprehensive, specific Linux PrivEsc reference online : )
CVE-2021-4034: Local Privilege Escalation in polkit's pkexec proof of concept
Exploits R&D
Add a description, image, and links to the lpe topic page so that developers can more easily learn about it.
To associate your repository with the lpe topic, visit your repo's landing page and select "manage topics."