⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
-
Updated
Mar 12, 2024 - Go
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
Working Dirty Pipe (CVE-2022-0847) exploit tool with root access and file overwrites.
This is a repo about some hacking scripts to make your hacks better and easier.This also includes a session on exploit development where we develop exploits for different vulnerabilities.Please do not use these for illegal purposes.
Linux Eelvation(持续更新)
CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸
PoC Container Breakout for DirtyPipe Vulnerability CVE-2022-0847
Scripted Linux Privilege Escalation for the CVE-2022-0847 "Dirty Pipe" vulnerability
DirtyPipe: Exploit for a new Linux vulnerability known as 'Dirty Pipe(CVE-2022-0847)' allows local users to gain root privileges. The vulnerability is tracked as CVE-2022-0847 and allows a non-privileged user to inject and overwrite data in read-only files, including SUID processes that run as root.
Implementation of CVE-2022-0847 as a shellcode
CVE-2022-0847 (Dirty Pipe) is an arbitrary file overwrite vulnerability that allows escalation of privileges by modifying or overwriting arbitrary read-only files e.g. /etc/passwd, /etc/shadow.
Add a description, image, and links to the cve-2022-0847 topic page so that developers can more easily learn about it.
To associate your repository with the cve-2022-0847 topic, visit your repo's landing page and select "manage topics."