Dirty COW Logo

Dirty COW

0
Free
Visit Website

Dirty COW (CVE-2016-5195) is a local privilege escalation vulnerability in the Linux kernel discovered by researcher Phil Oester, allowing an attacker to modify memory mapped files even if not permitted, through a race condition between write(2) and madvise(MADV_DONTNEED) calls.

FEATURES

ALTERNATIVES

Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.

A repository of open-source plugins for Rapid7 InsightConnect

tfsec is being replaced by Trivy, a more comprehensive open-source security solution

An extensible, heuristic-based vulnerability scanning tool for installed npm packages.

A search engine for the Internet of Things (IoT) that provides real-time information about connected devices.

A comprehensive guide to Android Security

A wargame designed to test your hacking skills and knowledge

Advanced vulnerability assessment tool for gaining visibility and preventing cyber attacks.