knqyf263 / CVE-2022-0847
The Dirty Pipe Vulnerability
☆47Updated 2 years ago
Alternatives and similar repositories for CVE-2022-0847:
Users that are interested in CVE-2022-0847 are comparing it to the libraries listed below
- CVEs <--> Metasploit-Framework modules☆23Updated this week
- Kubernetes CTF☆43Updated 4 years ago
- Trivy based vulnerability management service☆55Updated 2 months ago
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 2 years ago
- PoC for CVE-2020-8617 (BIND)☆45Updated 4 years ago
- TypeScript Scenario-Based Web Application Fuzzing Framework☆65Updated 2 years ago
- bouheki is KRSI(eBPF+LSM) based Linux security auditing tool.☆87Updated last year
- Tracing security events in container with BPF☆15Updated last year
- Scalable security network sensor as low interaction honeypot☆16Updated last year
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 4 years ago
- ☆31Updated 2 years ago
- whois command implemented by golang with awesome whois servers list☆63Updated last year
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 3 years ago
- lightweight CVE search☆21Updated last year
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆23Updated last month
- Mara is a userland pty/tty sniffer☆52Updated last year
- Generator of static files(csv, jpeg, png, pdf) for testing file upload. It can generate csv and png files of any number of bytes!☆61Updated last week
- Small Helper Library to increase automatically the file descriptors limits for the current process☆23Updated last year
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆25Updated last year
- Tiny embeddable dns server☆43Updated this week
- gozero: the wannabe zero dependency runtime for Go developers (experimental)☆20Updated 3 months ago
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Updated 3 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated 2 months ago
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆45Updated last year
- roundrobin with configurable rotating strategies☆15Updated last year
- POC for CVE-2022-23648☆36Updated 2 years ago
- Fakeshellは仮想的なシェル環境を提供するパッケージです。☆14Updated 2 years ago
- Kubernetes Unhinged Shell 😎☆45Updated 2 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆56Updated 2 years ago