metasploit-framework/modules/exploits/linux/local
h00die 2dfebe586e working cve-2014-0038 2016-10-08 23:58:09 -04:00
..
cron_persistence.rb fixes round 2 2016-07-15 08:44:39 -04:00
desktop_privilege_escalation.rb use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00
docker_daemon_privilege_escalation.rb Fix inverted logic in Docker exploit 2016-09-28 15:36:09 -05:00
hp_smhstart.rb use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00
kloxo_lxsuexec.rb Add missing rank 2016-09-28 16:37:04 -05:00
netfilter_priv_esc.rb Remove some anti-patterns, in the same spirit than #7372 2016-09-29 00:15:01 +02:00
pkexec.rb use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00
recvmmsg_priv_esc.rb working cve-2014-0038 2016-10-08 23:58:09 -04:00
service_persistence.rb updates round 2 2016-07-15 09:02:23 -04:00
sock_sendpage.rb use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00
sophos_wpa_clear_keys.rb use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00
udev_netlink.rb use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00
vmware_mount.rb use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00
zpanel_zsudo.rb use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00