AlexisAhmed / CVE-2022-0847-DirtyPipe-ExploitsLinks
A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.
☆629Updated 2 years ago
Alternatives and similar repositories for CVE-2022-0847-DirtyPipe-Exploits
Users that are interested in CVE-2022-0847-DirtyPipe-Exploits are comparing it to the libraries listed below
Sorting:
- A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)☆321Updated 2 years ago
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,116Updated 3 years ago
- A small reverse shell for Linux & Windows☆612Updated last year
- PHP shells that work on Linux OS, macOS, and Windows OS.☆504Updated last year
- Root shell PoC for CVE-2021-3156☆153Updated 3 years ago
- Penelope Shell Handler☆1,080Updated last week
- PoC for CVE-2023-4911☆388Updated last year
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆862Updated 5 months ago
- Netcat for windows 32/64 bit☆716Updated last year
- Sudo Baron Samedit Exploit☆771Updated 3 years ago
- Linux privilege escalation exploits collection.☆151Updated 2 years ago
- ☆289Updated 4 years ago
- ☆122Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆907Updated 2 years ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,148Updated 2 years ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆1,895Updated last week
- Collection of reverse shells for red team operations.☆512Updated 5 months ago
- ☆898Updated 2 years ago
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆798Updated 3 years ago
- JSshell - JavaScript reverse/remote shell☆627Updated 2 years ago
- exploit for CVE-2022-2588☆486Updated 2 years ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆292Updated 3 years ago
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,134Updated last year
- ☆215Updated 5 years ago
- Ubuntu OverlayFS Local Privesc☆429Updated last year
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆568Updated last year
- Privilege escalation with polkit - CVE-2021-3560☆121Updated 4 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,230Updated last year
- BLACKHAT USA2022 PDF Public☆505Updated 3 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,424Updated last month