AlexisAhmed / CVE-2022-0847-DirtyPipe-ExploitsLinks
A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.
☆616Updated 2 years ago
Alternatives and similar repositories for CVE-2022-0847-DirtyPipe-Exploits
Users that are interested in CVE-2022-0847-DirtyPipe-Exploits are comparing it to the libraries listed below
Sorting:
- A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)☆317Updated 2 years ago
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,108Updated 3 years ago
- Netcat for windows 32/64 bit☆689Updated last year
- Linux privilege escalation exploits collection.☆137Updated 2 years ago
- PHP shells that work on Linux OS, macOS, and Windows OS.☆500Updated last year
- Root shell PoC for CVE-2021-3156☆152Updated 3 years ago
- Penelope Shell Handler☆969Updated last week
- ☆849Updated 2 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆853Updated 3 months ago
- A small reverse shell for Linux & Windows☆608Updated last year
- Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)☆1,062Updated 4 years ago
- PoC for CVE-2023-4911☆388Updated last year
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,128Updated 2 years ago
- ☆281Updated 4 years ago
- Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation☆1,186Updated 3 years ago
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆793Updated 3 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,359Updated 3 months ago
- Windows Local Privilege Escalation from Service Account to System☆827Updated 5 years ago
- Sudo Baron Samedit Exploit☆761Updated 3 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆871Updated 2 years ago
- Collection of reverse shells for red team operations.☆502Updated 3 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,022Updated last month
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,125Updated 11 months ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆1,791Updated 3 weeks ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆558Updated last year
- ☆211Updated 4 years ago
- Abusing impersonation privileges through the "Printer Bug"☆2,034Updated 4 years ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆619Updated 8 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,158Updated last week
- ☆120Updated 2 years ago