The second in a series of four machines, each pen-tested and explained.
-
Updated
Nov 29, 2023 - C
The second in a series of four machines, each pen-tested and explained.
Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
BIL431 - Bilgi Güvenliği dersine ait dokümanlar
iOS customization app powered by CVE-2022-46689
Automated Android root via CVE-2016-5195 (dirtycow/dirtyc0w PoC)
Linux Privilege Escalation Tool By WazeHell
Add a description, image, and links to the dirtycow topic page so that developers can more easily learn about it.
To associate your repository with the dirtycow topic, visit your repo's landing page and select "manage topics."