febinrev / dirtypipez-exploit
CVE-2022-0847 DirtyPipe Exploit.
☆51Updated 3 years ago
Alternatives and similar repositories for dirtypipez-exploit:
Users that are interested in dirtypipez-exploit are comparing it to the libraries listed below
- Shielder's public proof of concepts collection☆30Updated 6 months ago
- ☆86Updated 2 years ago
- CVE-2021-4154 exploit☆66Updated 2 years ago
- LPE exploit for CVE-2024-0582 (io_uring)☆101Updated last year
- ☆63Updated last year
- CVE-2022-2602☆88Updated 2 years ago
- ☆68Updated 2 years ago
- PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.☆74Updated 2 years ago
- Chrome Android and Windows 0day RCE+SBX.. DPRK☆150Updated 2 years ago
- Linux kernel LPE practice with an NPD vulnerability☆36Updated last year
- CVE-2021-33909 Sequoia☆44Updated 3 years ago
- Tools to bypass flawed SELinux policies using the init_module system call☆52Updated last year
- ☆152Updated 2 years ago
- Project Vault Range PoC: Know your enemy and yourself to build better defense-in-depth solution!☆43Updated 5 months ago
- Proof of concept code for CVE-2023-2008☆36Updated last year
- POC of CVE-2023-35086 only DoS☆45Updated last year
- This is a pre-authenticated RCE exploit for VMware vRealize Operations Manager☆48Updated last year
- Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) f…☆23Updated 2 years ago
- Decrypt TP-Link Firmware☆23Updated 2 months ago
- ☆30Updated 2 months ago
- ☆79Updated 7 months ago
- CVE-2022-36946 linux kernel panic in netfilter_queue☆18Updated 9 months ago
- Foxit PDF Reader Remote Code Execution Exploit☆115Updated last year
- ☆70Updated last year
- Github Actions based repo to extract files from APKs.☆31Updated last month
- CVE-2022-0847 POC☆15Updated 3 years ago
- SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)☆95Updated 3 years ago
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago
- ☆47Updated 3 years ago
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Updated 2 years ago