Implementation of Max Kellermann's exploit for CVE-2022-0847
☆12Mar 8, 2022Updated 4 years ago
Alternatives and similar repositories for dirty-pipe
Users that are interested in dirty-pipe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MyBB 1.8.32 - Chained LFI Remote Code Execution (RCE) (Authenticated) python exploit script...☆14Oct 17, 2023Updated 2 years ago
- Simple .NET based network router for Windows implemented in C# using WPF☆10May 4, 2020Updated 5 years ago
- FavHash is a script that converts url to favhash to use it in search engines.☆18Apr 3, 2023Updated 2 years ago
- Expolit for android (goldfish kernel v3.10.0+) on arm64 with PXN&SELinux Bypassed. Based on fi01's code.☆18Jan 3, 2017Updated 9 years ago
- CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)☆18Dec 5, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆15Nov 24, 2025Updated 4 months ago
- BuddyPress is an open source WordPress plugin to build a community site. In releases of BuddyPress from 5.0.0 before 7.2.1 it's possible …☆19May 31, 2021Updated 4 years ago
- Compiled binaries of various security tools☆14May 19, 2021Updated 4 years ago
- 基于Frida的脱壳工具☆12Mar 8, 2021Updated 5 years ago
- Android Kernel Vulnerability (CVE-2019-2215) temporary root PoC☆14Dec 21, 2023Updated 2 years ago
- NAVER/LINE Vision Team Recruiting Page☆19Dec 13, 2023Updated 2 years ago
- Silly proof-of-concept for a PDF chatroom☆21May 3, 2023Updated 2 years ago
- Linux SocketCAN kernel module for the CANalyst II USB CAN adapter☆12Jun 10, 2019Updated 6 years ago
- App usage collection and statistics solution☆17Jan 4, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- a plugin to calculate complexity of executable's functions☆18May 17, 2022Updated 3 years ago
- adbd on non-Android platforms☆23Sep 5, 2017Updated 8 years ago
- A magisk module that allows adb to run as root on production builds☆34Aug 5, 2020Updated 5 years ago
- Dirty Pipe root exploit for Android (Pixel 6)☆24Nov 29, 2022Updated 3 years ago
- CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection☆33Apr 15, 2025Updated 11 months ago
- ☆19Feb 5, 2019Updated 7 years ago
- ☆11May 18, 2018Updated 7 years ago
- Privilege escalation in Docker☆31Jun 30, 2022Updated 3 years ago
- PWNCLOUDOS☆43Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Android properties management tool☆12Aug 14, 2017Updated 8 years ago
- Testing default web credentials☆34Dec 11, 2023Updated 2 years ago
- KernelSU modified for debugging☆34Aug 9, 2023Updated 2 years ago
- 4D Miner C++ Modding Headers / 4D-Modding API Headers☆12Mar 8, 2026Updated 2 weeks ago
- 책읽기 스터디☆17Dec 9, 2021Updated 4 years ago
- 😁 Easy Regex☆28Apr 9, 2023Updated 2 years ago
- // Documentation☆31Feb 17, 2026Updated last month
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 7 months ago
- IHULK (Improved Http Unbearable Load King) DoS Tool Ported to Python 3☆22Jan 16, 2017Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.☆56Dec 29, 2023Updated 2 years ago
- Detailed discussion of Zygote vulnerability CVE-2024-31317☆21Aug 5, 2025Updated 7 months ago
- StumpWM Debugger☆11Apr 19, 2025Updated 11 months ago
- 유니티 5 교과서☆22Apr 5, 2017Updated 8 years ago
- ☆13Jun 5, 2018Updated 7 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago