exrienz / DirtyCowView external linksLinks
Dirtycow exploit for both 32 and 64-bit
☆29Jul 23, 2018Updated 7 years ago
Alternatives and similar repositories for DirtyCow
Users that are interested in DirtyCow are comparing it to the libraries listed below
Sorting:
- SAMBA Symlink Directory Traversal Manual Exploitation☆32Dec 23, 2019Updated 6 years ago
- Grepz is a versatile command-line tool for searching and highlighting specific terms or regex in a text file. Its customizable color opti…☆15May 4, 2023Updated 2 years ago
- ☆19Sep 17, 2025Updated 4 months ago
- Scripts,shell used for solving box☆15Dec 28, 2020Updated 5 years ago
- An Intro to Penetration Testing Workshop☆15May 31, 2018Updated 7 years ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container☆15Dec 16, 2017Updated 8 years ago
- ☆17Sep 3, 2015Updated 10 years ago
- This script helps to identify CVE-2021-26855 ssrf Poc☆22Mar 10, 2021Updated 4 years ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Jul 23, 2024Updated last year
- ☆17May 29, 2015Updated 10 years ago
- HP Power Manager 'formExportDataLogs' Buffer Overflow☆22Aug 13, 2017Updated 8 years ago
- Password and email checker. It is your password or email compromissed? Check it now!☆11Dec 8, 2022Updated 3 years ago
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- Security checks for your researches☆34Nov 22, 2020Updated 5 years ago
- A solid recon tool I use personally.☆30May 12, 2023Updated 2 years ago
- Stay within program scope☆37Aug 17, 2022Updated 3 years ago
- Practice typing and improve your typing speed (WPM).☆10Aug 20, 2020Updated 5 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Dec 3, 2020Updated 5 years ago
- A modular PowerShell-based packaging framework for automated, parameter-driven application deployment. Separates logic and metadata, supp…☆12Oct 29, 2025Updated 3 months ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆31Jun 4, 2025Updated 8 months ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆78Jan 29, 2021Updated 5 years ago
- ☆138May 17, 2017Updated 8 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- Merge files in one is a Notepad++ plugin☆12Nov 5, 2019Updated 6 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 3 months ago
- Herramienta para spamear correos electrónicos creada con Python y SMTP, se necesita un correo electrónico de Outlook para poder usar la h…☆15May 1, 2023Updated 2 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.☆13Apr 17, 2018Updated 7 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- ☆13Sep 15, 2024Updated last year
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20May 17, 2023Updated 2 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆18Jul 9, 2025Updated 7 months ago
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- Exploit for uTorrent vulnerability CVE-2020-8437 by mavlevin☆11Feb 1, 2026Updated last week