A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.
☆702May 20, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2022-0847-DirtyPipe-Exploits
Users that are interested in CVE-2022-0847-DirtyPipe-Exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bash script to check for CVE-2022-0847 "Dirty Pipe"☆69Jun 14, 2023Updated 2 years ago
- GitLab User Enumeration☆56Jan 3, 2025Updated last year
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,126Mar 8, 2022Updated 4 years ago
- Abusing impersonation privileges through the "Printer Bug"☆2,215Sep 10, 2020Updated 5 years ago
- ☆193Jan 12, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Another Windows Local Privilege Escalation from Service Account to System☆1,166Jan 9, 2021Updated 5 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆232Feb 20, 2020Updated 6 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆134Aug 20, 2018Updated 7 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆438Jul 29, 2013Updated 12 years ago
- Tools for Kerberos PKINIT and relaying to AD CS☆891Jan 3, 2025Updated last year
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,756Dec 18, 2021Updated 4 years ago
- Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)☆1,097Jul 5, 2021Updated 4 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆988Jan 29, 2023Updated 3 years ago
- A Python based ingestor for BloodHound☆2,371Oct 24, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This script will bruteforce the credential of tomcat manager or host-manager☆33Jun 24, 2020Updated 5 years ago
- Compiled Binaries for Ghostpack☆1,635Oct 24, 2024Updated last year
- Extracts Key Values from .keytab files☆353Aug 26, 2020Updated 5 years ago
- PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)☆1,140May 4, 2023Updated 2 years ago
- ☆1,007Feb 2, 2021Updated 5 years ago
- WhiteWinterWolf's PHP web shell☆767Dec 2, 2017Updated 8 years ago
- Monitor linux processes without root permissions☆5,952Mar 1, 2026Updated last month
- exploit for CVE-2022-2588☆488Mar 4, 2023Updated 3 years ago
- Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation☆1,302Jun 21, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Joomla login bruteforce☆110Jul 18, 2024Updated last year
- ☆2,224Nov 24, 2023Updated 2 years ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆890Apr 8, 2025Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,614Apr 1, 2026Updated last week
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆2,209Aug 15, 2024Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,448Feb 15, 2026Updated last month
- linikatz is a tool to attack AD on UNIX☆596Oct 19, 2023Updated 2 years ago
- This is a standalone exploit for a vulnerable feature in Capcom.sys☆332Sep 18, 2022Updated 3 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,563Feb 20, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A tool to perform Kerberos pre-auth bruteforcing☆3,296Aug 20, 2024Updated last year
- C# Data Collector for BloodHound☆1,239Apr 3, 2026Updated last week
- The ultimate WinRM shell for hacking/pentesting☆5,325Mar 10, 2026Updated last month
- Proof of concept for abusing SeLoadDriverPrivilege (Privilege Escalation in Windows)☆163Jun 14, 2018Updated 7 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆936Nov 11, 2024Updated last year
- SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.☆1,404Jun 27, 2024Updated last year
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,538Jan 10, 2025Updated last year