firefart / dirtycowLinks
Dirty Cow exploit - CVE-2016-5195
☆893Updated this week
Alternatives and similar repositories for dirtycow
Users that are interested in dirtycow are comparing it to the libraries listed below
Sorting:
- The great impacket example scripts compiled for Windows☆972Updated 6 years ago
- Redis(<=5.0.5) RCE☆1,078Updated last year
- Sudo Baron Samedit Exploit☆765Updated 3 years ago
- Simple reverse ICMP shell☆1,602Updated 7 years ago
- Next-Generation Linux Kernel Exploit Suggester☆1,926Updated 2 years ago
- MS17-010☆2,200Updated 2 years ago
- ODAT: Oracle Database Attacking Tool☆1,689Updated last year
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,881Updated 4 years ago
- Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938)☆395Updated 5 years ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,657Updated 8 months ago
- MySQL fake server for read files of connected clients☆599Updated 8 years ago
- A CVE-2016-5195 exploit example.☆326Updated 8 years ago
- Linux Exploit Suggester; based on operating system release number☆1,796Updated 11 years ago
- ☆1,355Updated 5 years ago
- ☆472Updated last year
- Redis 4.x/5.x RCE☆964Updated 3 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,471Updated 5 years ago
- Flask Session Cookie Decoder/Encoder☆705Updated 5 months ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,329Updated 4 years ago
- ☆881Updated last year
- TCP tunneling over HTTP/HTTPS for web application servers☆744Updated 8 years ago
- Blind WAF identification tool☆684Updated last year
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,101Updated 4 months ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,611Updated 3 years ago
- A collection of pentest and development tips☆1,121Updated 3 years ago
- an IIS shortname Scanner☆561Updated 2 years ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,144Updated 2 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆918Updated 5 years ago
- Java RMI enumeration and attack tool.☆738Updated 7 years ago
- HackBar plugin for Burpsuite☆1,583Updated 4 years ago