febinrev / dirtypipez-exploitLinks
CVE-2022-0847 DirtyPipe Exploit.
☆49Updated 3 years ago
Alternatives and similar repositories for dirtypipez-exploit
Users that are interested in dirtypipez-exploit are comparing it to the libraries listed below
Sorting:
- Github Actions based repo to extract files from APKs.☆33Updated 10 months ago
- Shielder's public proof of concepts collection☆33Updated 4 months ago
- CVE-2021-4154 exploit☆66Updated 3 years ago
- LPE exploit for CVE-2024-0582 (io_uring)☆101Updated last year
- ☆86Updated 2 years ago
- CVE-2021-33909 Sequoia☆46Updated 4 years ago
- Chrome Android and Windows 0day RCE+SBX.. DPRK☆153Updated 3 years ago
- POC of CVE-2023-35086 only DoS☆44Updated 2 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago
- MobSF Remote code execution (via CVE-2024-21633)☆80Updated last year
- ☆80Updated 9 months ago
- Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) f…☆26Updated 2 years ago
- CVE-2022-22639: Get a Root Shell on macOS Monterey☆122Updated 3 years ago
- Tools to bypass flawed SELinux policies using the init_module system call☆58Updated 2 years ago
- PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.☆74Updated 3 years ago
- CVE-2022-2602☆87Updated 2 years ago
- CVE-2022-0847 POC☆15Updated 3 years ago
- ☆37Updated 11 months ago
- ☆72Updated 2 years ago
- ☆64Updated 2 years ago
- Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847.☆58Updated 3 years ago
- Foxit PDF Reader Remote Code Execution Exploit☆120Updated 2 years ago
- xortigate-cve-2023-27997☆65Updated 2 years ago
- ☆152Updated 2 years ago
- Proof of concept code for CVE-2023-2008☆40Updated 2 years ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85Updated 2 years ago
- Linux kernel LPE practice with an NPD vulnerability☆37Updated 2 years ago
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Updated 2 months ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆130Updated 3 years ago
- Cisco ASA Software and ASDM Security Research☆86Updated 3 years ago