Dirty COW Logo

Dirty COW

0
Free
Visit Website

Dirty COW (CVE-2016-5195) is a local privilege escalation vulnerability in the Linux kernel discovered by researcher Phil Oester, allowing an attacker to modify memory mapped files even if not permitted, through a race condition between write(2) and madvise(MADV_DONTNEED) calls.

FEATURES

ALTERNATIVES

A categorized collection of bug bounty write-ups for various vulnerabilities.

A tool that detects dangling DNS records in a multi-cloud environment to prevent subdomain takeovers.

Cloud-based service for testing and analyzing Android and iOS apps for malware, vulnerabilities, and security threats.

OCaml bindings to the YARA scanning engine for integrating YARA scanning capabilities into OCaml projects

A wargame composed of 27 levels, with files needed in /vortex/ directory.

Fast and customizable vulnerability scanner

A comprehensive database of exploits and vulnerabilities for researchers and professionals

A comprehensive guide to Android Security

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved