Dirty COW Logo

Dirty COW

0
Free
Visit Website

Dirty COW (CVE-2016-5195) is a local privilege escalation vulnerability in the Linux kernel discovered by researcher Phil Oester, allowing an attacker to modify memory mapped files even if not permitted, through a race condition between write(2) and madvise(MADV_DONTNEED) calls.

FEATURES

ALTERNATIVES

A tool for static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers

A comprehensive database of exploits and vulnerabilities for researchers and professionals

A JavaScript scanner built in PHP for scraping URLs and other information.

A fully customizable, offensive security reporting solution for pentesters, red teamers, and other security professionals.

A list of vulnerable applications for testing and learning

An enterprise vulnerability and exposure risk management platform that consolidates, prioritizes, and orchestrates remediation of security vulnerabilities across infrastructure, applications, and cloud environments.

Audits JavaScript projects for known vulnerabilities and outdated package versions using OSS Index v3 REST API.

TANNER is a remote data analysis and classification service for evaluating HTTP requests and composing responses for SNARE.