Dirty COW (CVE-2016-5195) is a local privilege escalation vulnerability in the Linux kernel discovered by researcher Phil Oester, allowing an attacker to modify memory mapped files even if not permitted, through a race condition between write(2) and madvise(MADV_DONTNEED) calls.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Script to find exploits for vulnerable software packages on Linux systems using an exploit database.
LeakIX is a red-team search engine that indexes mis-configurations and vulnerabilities online.
Scans Alpine base images for vulnerabilities using Multi Stage builds in Docker 17.05
An open-source attack surface management platform for identifying and managing vulnerabilities
Linux Exploit Suggester; suggests possible exploits based on the Linux operating system release number.
A tool for scanning and identifying potential security risks in GitHub organizations, users, and repositories.
A virtual host scanner with the ability to detect catch-all scenarios, aliases, and dynamic default pages, presented at SecTalks BNE in September 2017.
A vulnerability and exposure management platform that unifies security tool data, automates workflows, and provides risk-based prioritization for enterprise vulnerability management programs.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.