CVE-2022-0847 DirtyPipe Exploit.
☆49Mar 8, 2022Updated 3 years ago
Alternatives and similar repositories for dirtypipez-exploit
Users that are interested in dirtypipez-exploit are comparing it to the libraries listed below
Sorting:
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- ☆11Mar 9, 2016Updated 9 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- ☆32Aug 10, 2020Updated 5 years ago
- Various scripts and tools to tinker with Huawei devices☆18Nov 20, 2025Updated 3 months ago
- .Net library to create Maltego transformations.☆17Feb 11, 2025Updated last year
- A fun tool that attempts to find product keys for commercial softwares☆18Jun 18, 2017Updated 8 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆23Dec 19, 2022Updated 3 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆56Dec 31, 2025Updated 2 months ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Markdown repo for notes on all things redteaming☆52Apr 19, 2024Updated last year
- ☆21Aug 3, 2022Updated 3 years ago
- Github repository which contains a functional exploit for CVE-2021-39165☆22Jul 13, 2022Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆22Feb 26, 2021Updated 5 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- ☆24Jan 24, 2025Updated last year
- ☆22Apr 22, 2022Updated 3 years ago
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Nov 3, 2020Updated 5 years ago
- ☆28Apr 12, 2020Updated 5 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.☆691May 20, 2023Updated 2 years ago
- ☆31May 31, 2022Updated 3 years ago
- A wrapper around grep, to help you grep for things! - Improved version of gf by @tomnomnom.☆62Nov 17, 2023Updated 2 years ago
- Duplicate not owned Token from Running Process☆74Jul 21, 2023Updated 2 years ago
- Python version of OWASP's DirBuster Application.☆29Dec 18, 2014Updated 11 years ago
- Use angr to deflat the flat control flow.☆25May 31, 2019Updated 6 years ago
- Python bind shell single line code for both Unix and Windows, used to find and exploit RCE (ImageMagick, Ghostscript, ...)☆31Sep 9, 2021Updated 4 years ago
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆37Aug 13, 2025Updated 6 months ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Oct 27, 2013Updated 12 years ago
- ☆32Mar 6, 2023Updated 3 years ago
- ☆27Mar 25, 2021Updated 4 years ago
- LDAP enumeration tool implemented in Python3☆224May 20, 2025Updated 9 months ago
- A simple calculator to help users figure how much DXM they should take factoring in their weight and source of DXM☆13Apr 6, 2025Updated 11 months ago
- Pacmania done in Unity and C# ( complete arcade clone)☆12May 24, 2024Updated last year
- APK for Angry Birds games that are no longer updated and no longer found in Google Play.☆13Jul 22, 2023Updated 2 years ago
- Crascan is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner.☆31Nov 4, 2018Updated 7 years ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆27May 23, 2023Updated 2 years ago
- Sahabat ZK1☆11Oct 27, 2019Updated 6 years ago