Skip to content

0x6B7563696E676C696172/Localroot-ALL-CVE

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

39 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Localroot Collection ✨

pixelscoders

Linux

2001 //
2002 //
2003 //
2004 //
2005 //
2006 //
2007 //
2008 //
2009 //
2010 //
2011 //
2012 //
2013 //
2014 //
2015 //
2016 //
2017 //
2018 //
2019 //
2021 //
2022 //
Default

This exploit uses the pokemon exploit of the dirtycow vulnerability as a base and automatically generates a new passwd line. The user will be prompted for the new password when the binary is run. The original /etc/passwd file is then backed up to /tmp/paww.bak and overwrites the root account with the generated line. After running the exploit you should be able to login with the newly created user.

IBM AIX

FreeBSD

2005 //
2008 //
2009 //
2010 //
2011 //
2012 //
2013 //

Releases

No releases published

Packages

No packages published

Languages

  • C 84.6%
  • Python 6.2%
  • Shell 4.3%
  • Ruby 3.2%
  • HTML 1.2%
  • Perl 0.4%
  • Makefile 0.1%