scumjr / dirtycow-vdsoLinks
PoC for Dirty COW (CVE-2016-5195)
☆501Updated 3 years ago
Alternatives and similar repositories for dirtycow-vdso
Users that are interested in dirtycow-vdso are comparing it to the libraries listed below
Sorting:
- ☆144Updated 5 years ago
- PoC for CVE-2019-5736☆653Updated 3 years ago
- Linux 4.10 < 5.1.17 PTRACE_TRACEME local root☆330Updated 6 years ago
- A CVE-2016-5195 exploit example.☆328Updated 8 years ago
- Rogue MySql Server☆473Updated 12 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆379Updated 3 years ago
- ☆891Updated last year
- Shocker / Docker Breakout PoC☆121Updated 11 years ago
- My proof-of-concept exploits for the Linux kernel☆1,498Updated last week
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆201Updated 7 years ago
- Tiny SHell is an open-source UNIX backdoor.☆705Updated 11 years ago
- Multi-language web CGI interfaces exploits.☆393Updated 3 years ago
- Java Message Exploitation Tool☆509Updated 3 years ago
- Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)☆206Updated 6 years ago
- Proof of concept for LD_PRELOAD malware that uses extended attributes to protect files.☆119Updated 9 years ago
- Java RMI enumeration and attack tool.☆742Updated 7 years ago
- LibZeroEvil & the Research Rootkit project.☆596Updated 3 years ago
- Security-related PHP7 OPcache abuse tools and demo☆316Updated 2 years ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆485Updated 8 years ago
- SHELLING - a comprehensive OS command injection payload generator☆444Updated 5 years ago
- Script to execute in memory a sequence of opcodes☆413Updated 11 years ago
- HCTF 2016 CHALLENGES☆114Updated 8 years ago
- chw00t - Unices chroot breaking tool☆606Updated 6 years ago
- Various kernel exploits☆793Updated last year
- A multiple reverse shell session/client manager via terminal☆239Updated 2 years ago
- ☆232Updated 6 years ago
- Source code, writeups and exps in LCTF2017.☆168Updated 7 years ago
- A writeup summary for CTF competitions, problems.☆353Updated last year
- A framework for CTF Attack with Defense Mode☆219Updated 6 years ago
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆514Updated 3 years ago