c0deghost
Here are 7 public repositories matching this topic...
Hello, friend. This is the core. The logic they didn't want you to see. A curated collection of weaponized thoughts designed to dismantle the illusion of security. From low-level kernel panics to high-level infrastructure liquidation. We are the bug in their system. Control is an illusion.
-
Updated
May 1, 2026 - Python
Hello friend. This is the key to the kingdom. Advanced LPE exploit for CheckMK (CVE-2024-0670). Abuses insecure file handling for SYSTEM access. Includes surgical persistence module. Written in C++. They thought they were safe. They were wrong. The 5/9 revolution starts with a root shell. > We Are Fsociety_
-
Updated
Dec 21, 2025 - C++
The Ultimate DAEMON_KILLER. Control is an illusion. This Exploit forces CVE-2025-9074 to break the Docker cage. Advanced Container Escape & Root Escalation toolkit. Verify the vulnerability, take the host, destroy the logs. > We Are Fsociety_
-
Updated
Dec 15, 2025 - Shell
Streamline red team operations with a hybrid cloud arsenal for advanced offensive security, threat emulation, and controlled testing
-
Updated
May 5, 2026 - Python
🔍 Exploit CVE-2024-0670 in CheckMK agents for local privilege escalation using a robust C++ tool designed for security professionals.
-
Updated
May 5, 2026 - C++
🚀 Exploit CVE-2025-9074 with this Docker escape framework, simplifying API vulnerabilities and enhancing security testing for developers and researchers.
-
Updated
May 5, 2026 - Shell
Improve this page
Add a description, image, and links to the c0deghost topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the c0deghost topic, visit your repo's landing page and select "manage topics."