Skip to content
View t0kx's full-sized avatar
Block or Report

Block or report t0kx

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned

  1. exploit-CVE-2015-1427 exploit-CVE-2015-1427 Public

    Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container

    Shell 33 16

  2. exploit-CVE-2015-3306 exploit-CVE-2015-3306 Public

    ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container

    Python 124 55

  3. exploit-CVE-2016-9920 exploit-CVE-2016-9920 Public

    Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container

    Python 43 21

  4. privesc-CVE-2015-5602 privesc-CVE-2015-5602 Public

    Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container

    Shell 11 23

  5. exploit-CVE-2014-6271 exploit-CVE-2014-6271 Public

    Forked from opsxcq/exploit-CVE-2014-6271

    Shellshock exploit + vulnerable environment

    Shell 2

  6. privesc-CVE-2010-0426 privesc-CVE-2010-0426 Public

    Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container

    Shell 10 13