AlexisAhmed / CVE-2022-0847-DirtyPipe-ExploitsLinks
A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.
☆613Updated 2 years ago
Alternatives and similar repositories for CVE-2022-0847-DirtyPipe-Exploits
Users that are interested in CVE-2022-0847-DirtyPipe-Exploits are comparing it to the libraries listed below
Sorting:
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,108Updated 3 years ago
- A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)☆317Updated 2 years ago
- Sudo Baron Samedit Exploit☆755Updated 3 years ago
- Penelope Shell Handler☆948Updated 2 weeks ago
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆791Updated 3 years ago
- PoC for CVE-2023-4911☆389Updated last year
- A small reverse shell for Linux & Windows☆607Updated last year
- Root shell PoC for CVE-2021-3156☆151Updated 3 years ago
- Windows Local Privilege Escalation from Service Account to System☆821Updated 5 years ago
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,123Updated 11 months ago
- ☆1,986Updated last year
- ☆843Updated 2 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,006Updated last week
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,330Updated 4 months ago
- PHP shells that work on Linux OS, macOS, and Windows OS.☆494Updated last year
- Another Windows Local Privilege Escalation from Service Account to System☆868Updated 2 years ago
- exploit for CVE-2022-2588☆486Updated 2 years ago
- Simple and accurate guide for linux privilege escalation tactics☆219Updated last year
- BLACKHAT USA2022 PDF Public☆503Updated 2 years ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,125Updated 2 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,345Updated 2 months ago
- Abusing impersonation privileges through the "Printer Bug"☆2,023Updated 4 years ago
- Ubuntu OverlayFS Local Privesc☆425Updated last year
- Linux PAM Backdoor☆338Updated last year
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆849Updated 3 months ago
- Linux privilege escalation exploits collection.☆133Updated 2 years ago
- Windows Local Privilege Escalation Cookbook☆1,129Updated 5 months ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,096Updated 4 years ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010☆1,273Updated last year
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,169Updated last year