exploit for dirtycow
☆14Dec 21, 2022Updated 3 years ago
Alternatives and similar repositories for dirtycow
Users that are interested in dirtycow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The project black zone☆18Nov 9, 2017Updated 8 years ago
- CVE-2022-0185 exploit rewritten with pipe primitive☆17Apr 5, 2022Updated 3 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- ☆16Jun 9, 2023Updated 2 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆101Apr 5, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Writeups of CTF challenges I do☆13Sep 29, 2019Updated 6 years ago
- My-CTF-Challenges☆15Sep 27, 2021Updated 4 years ago
- 🔨Reverse Shell 备忘录☆16Apr 2, 2020Updated 5 years ago
- a pwn demo for easy manage a pwn server☆25Aug 3, 2016Updated 9 years ago
- RealWorld CTF 5th realwrap challenge☆18May 21, 2023Updated 2 years ago
- ☆10Mar 6, 2026Updated 3 weeks ago
- CVE-2022-25636 exploit rewritten with pipe primitive☆20Apr 5, 2022Updated 3 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- ☆18May 25, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆21Jul 27, 2020Updated 5 years ago
- interactive hex file viewer☆14Jan 30, 2021Updated 5 years ago
- Linux kernel source code for Galaxy S22. Extracted from SM-S901U_NA_12_Opensource.zip☆15Oct 7, 2022Updated 3 years ago
- Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques☆54Oct 6, 2017Updated 8 years ago
- binary ninja plugin for adding custom hooks to executables☆16Mar 29, 2021Updated 4 years ago
- linux kernel cross page attack demo module☆32Mar 15, 2023Updated 3 years ago
- IDAPython / IDC tips and tricks☆38Oct 25, 2022Updated 3 years ago
- ☆34Jun 11, 2024Updated last year
- Analyze IoT firmware☆17Apr 24, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Browser Vulnerability Exploit DB(浏览器漏洞PoC数据库)☆10Feb 7, 2017Updated 9 years ago
- ☆15Mar 13, 2023Updated 3 years ago
- From The Shadow : )☆21Apr 13, 2019Updated 6 years ago
- automatic privilege escalation by pspy☆23Jan 19, 2022Updated 4 years ago
- ☆18Aug 15, 2025Updated 7 months ago
- attachments for forum of RealWorld CTF 3rd☆42Jan 7, 2021Updated 5 years ago
- Starbound and Casio writeup and exploit for CTCTF 2015☆10Feb 5, 2015Updated 11 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- ☆22Oct 30, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆14Nov 5, 2020Updated 5 years ago
- ☆13May 5, 2018Updated 7 years ago
- ☆47Dec 7, 2022Updated 3 years ago
- ☆20Feb 27, 2022Updated 4 years ago
- Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code☆21Feb 13, 2023Updated 3 years ago
- Show all mapped memory in a process☆22Oct 27, 2023Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago