Here are
19 public repositories
matching this topic...
CVE-2021-3560 Local PrivEsc Exploit
-
Updated
Jun 12, 2021
-
Shell
Proof of Concept (PoC) CVE-2021-4034
a polkit agent in 145 lines of code, because polkit is dumb and none of the other agents worked
CVE-2021-4034: Local Privilege Escalation in polkit's pkexec proof of concept
centos 6.10 rpm for fix polkit CVE-2021-4034; centos 6.10的rpm包,修复CVE-2021-4034 漏洞
-
Updated
Jan 29, 2022
-
Shell
Rust bindings for polkit libraries
-
Updated
Apr 2, 2022
-
Shell
Script en python sobre la vulnerabilidad CVE-2021-3560
-
Updated
Mar 8, 2022
-
Python
-
Updated
Jun 17, 2021
-
JavaScript
Demo of using Polkit for Privilege Elevation using File Descriptor Passing over Unix Domain Sockets
f4T1H's PoC script for CVE-2021-3560 Polkit D-Bus Privilege Escalation
-
Updated
Feb 13, 2022
-
Shell
shell scripts for polybar
-
Updated
Apr 9, 2022
-
Shell
Allows individuals to test the use of polkits for a better understanding of how it works: rules, actions, etc
-
Updated
Jun 23, 2019
-
Shell
Safe and Easy way to build and install packages directly from Arch User Repository
-
Updated
Mar 15, 2022
-
Python
Polkit CVE-2021-4034 exploitation in High-Level Programming Language
This is a POC for the vulnerability found in polkit's pkexec binary which is used to run programs as another users.
A custom ubuntu-16.04-deskto-adm64.iso build
-
Updated
Oct 28, 2018
-
Shell
Improve this page
Add a description, image, and links to the
polkit
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
polkit
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.