From e6cf01897eda26edfa516b469b8def47187d5ae8 Mon Sep 17 00:00:00 2001 From: "Pedro V. P." <2190926+pvaladares@users.noreply.github.com> Date: Mon, 2 Jun 2025 19:51:32 +0100 Subject: [PATCH] Update README.md The repository is now hosted on gitlab --- src/linux-hardening/privilege-escalation/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/linux-hardening/privilege-escalation/README.md b/src/linux-hardening/privilege-escalation/README.md index 3c7366620..9643384ca 100644 --- a/src/linux-hardening/privilege-escalation/README.md +++ b/src/linux-hardening/privilege-escalation/README.md @@ -40,7 +40,7 @@ uname -a searchsploit "Linux Kernel" ``` -You can find a good vulnerable kernel list and some already **compiled exploits** here: [https://github.com/lucyoa/kernel-exploits](https://github.com/lucyoa/kernel-exploits) and [exploitdb sploits](https://github.com/offensive-security/exploitdb-bin-sploits/tree/master/bin-sploits).\ +You can find a good vulnerable kernel list and some already **compiled exploits** here: [https://github.com/lucyoa/kernel-exploits](https://github.com/lucyoa/kernel-exploits) and [exploitdb sploits](https://gitlab.com/exploit-database/exploitdb-bin-sploits).\ Other sites where you can find some **compiled exploits**: [https://github.com/bwbwbwbw/linux-exploit-binaries](https://github.com/bwbwbwbw/linux-exploit-binaries), [https://github.com/Kabot/Unix-Privilege-Escalation-Exploits-Pack](https://github.com/Kabot/Unix-Privilege-Escalation-Exploits-Pack) To extract all the vulnerable kernel versions from that web you can do: