Skip to content

Latest commit

 

History

History
160 lines (128 loc) · 16.2 KB

README.md

File metadata and controls

160 lines (128 loc) · 16.2 KB

Localroot Collection ✨

pixelscoders

Linux

2001 //
2002 //
2003 //
2004 //
2005 //
2006 //
2007 //
2008 //
2009 //
2010 //
2011 //
2012 //
2013 //
2014 //
2015 //
2016 //
2017 //
2018 //
2019 //
2021 //
2022 //
Default

This exploit uses the pokemon exploit of the dirtycow vulnerability as a base and automatically generates a new passwd line. The user will be prompted for the new password when the binary is run. The original /etc/passwd file is then backed up to /tmp/paww.bak and overwrites the root account with the generated line. After running the exploit you should be able to login with the newly created user.

IBM AIX

FreeBSD

2005 //
2008 //
2009 //
2010 //
2011 //
2012 //
2013 //