Dirtycow exploit for both 32 and 64-bit
☆29Jul 23, 2018Updated 7 years ago
Alternatives and similar repositories for DirtyCow
Users that are interested in DirtyCow are comparing it to the libraries listed below
Sorting:
- PoC List☆10Sep 4, 2022Updated 3 years ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆32Dec 23, 2019Updated 6 years ago
- Grepz is a versatile command-line tool for searching and highlighting specific terms or regex in a text file. Its customizable color opti…☆15May 4, 2023Updated 2 years ago
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 5 years ago
- ☆19Sep 17, 2025Updated 5 months ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Jan 17, 2018Updated 8 years ago
- An Intro to Penetration Testing Workshop☆15May 31, 2018Updated 7 years ago
- Scripts,shell used for solving box☆15Dec 28, 2020Updated 5 years ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- ☆17Sep 3, 2015Updated 10 years ago
- Port scanner in bash☆16Nov 8, 2013Updated 12 years ago
- This script helps to identify CVE-2021-26855 ssrf Poc☆22Mar 10, 2021Updated 4 years ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Jul 23, 2024Updated last year
- ☆17May 29, 2015Updated 10 years ago
- HP Power Manager 'formExportDataLogs' Buffer Overflow☆22Aug 13, 2017Updated 8 years ago
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated 11 months ago
- Password and email checker. It is your password or email compromissed? Check it now!☆11Dec 8, 2022Updated 3 years ago
- A solid recon tool I use personally.☆30May 12, 2023Updated 2 years ago
- Stay within program scope☆37Aug 17, 2022Updated 3 years ago
- Plattform to develop and experiment with existing java web attacks.☆31Jan 8, 2018Updated 8 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Dec 3, 2020Updated 5 years ago
- Practice typing and improve your typing speed (WPM).☆10Aug 20, 2020Updated 5 years ago
- A modular PowerShell-based application packaging framework for standardized, parameter-driven and deployment-system-independent software …☆12Oct 29, 2025Updated 4 months ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆31Jun 4, 2025Updated 9 months ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆79Jan 29, 2021Updated 5 years ago
- ☆138May 17, 2017Updated 8 years ago
- ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container☆147Apr 7, 2018Updated 7 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.☆13Apr 17, 2018Updated 7 years ago
- Merge files in one is a Notepad++ plugin☆13Nov 5, 2019Updated 6 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 3 months ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- This script is written in Perl this is very good admin page finder.☆11Aug 29, 2020Updated 5 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated 2 weeks ago
- Social Engineering for the Blue Team☆11Feb 1, 2024Updated 2 years ago