Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Dirty Cow | https://github.com/KosukeShimofuji/CVE-2016-5195 | POC Details |
| 2 | None | https://github.com/ASRTeam/CVE-2016-5195 | POC Details |
| 3 | CVE-2016-5195 (dirtycow/dirtyc0w) proof of concept for Android | https://github.com/timwr/CVE-2016-5195 | POC Details |
| 4 | CVE-2016-5195 exploit written in Crystal | https://github.com/xlucas/dirtycow.cr | POC Details |
| 5 | Ansible playbook to mitigate CVE-2016-5195 on CentOS | https://github.com/istenrot/centos-dirty-cow-ansible | POC Details |
| 6 | Mitigates CVE-2016-5195 aka DirtyCOW | https://github.com/pgporada/ansible-role-cve | POC Details |
| 7 | Dirty COW (CVE-2016-5195) vulnerability testing utility for Linux-based systems. | https://github.com/sideeffect42/DirtyCOWTester | POC Details |
| 8 | PoC for Dirty COW (CVE-2016-5195) | https://github.com/scumjr/dirtycow-vdso | POC Details |
| 9 | A CVE-2016-5195 exploit example. | https://github.com/gbonacini/CVE-2016-5195 | POC Details |
| 10 | Universal Android root tool based on CVE-2016-5195. Watch this space. | https://github.com/DavidBuchanan314/cowroot | POC Details |
| 11 | Scan vuls kernel CVE-2016-5195 - DirtyCow | https://github.com/aishee/scan-dirtycow | POC Details |
| 12 | None | https://github.com/oleg-fiksel/ansible_CVE-2016-5195_check | POC Details |
| 13 | Recent Linux privilege escalation exploit | https://github.com/ldenevi/CVE-2016-5195 | POC Details |
| 14 | 这里保留着部分脏牛漏洞的利用代码 | https://github.com/whu-enjoy/CVE-2016-5195 | POC Details |
| 15 | Dirty Cow exploit - CVE-2016-5195 | https://github.com/firefart/dirtycow | POC Details |
| 16 | Inspec profile for detecting CVE-2016-5195 aka Dirty COW | https://github.com/ndobson/inspec_CVE-2016-5195 | POC Details |
| 17 | None | https://github.com/linhlt247/DirtyCOW_CVE-2016-5195 | POC Details |
| 18 | None | https://github.com/sribaba/android-CVE-2016-5195 | POC Details |
| 19 | Android APK Based On Public Information Using DirtyCOW CVE-2016-5195 Exploit | https://github.com/esc0rtd3w/org.cowpoop.moooooo | POC Details |
| 20 | CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow | https://github.com/hyln9/VIKIROOT | POC Details |
| 21 | CVE-2016-5195 dirtycow by timwr automated multi file patch tool | https://github.com/droidvoider/dirtycow-replacer | POC Details |
| 22 | os experiment 4 CVE-2016-5195 | https://github.com/FloridSleeves/os-experiment-4 | POC Details |
| 23 | Ready to use, weaponized dirtycow (CVE-2016-5195) | https://github.com/arbll/dirtycow | POC Details |
| 24 | Dirty COW (CVE-2016-5195) Testing | https://github.com/titanhp/Dirty-COW-CVE-2016-5195-Testing | POC Details |
| 25 | None | https://github.com/acidburnmi/CVE-2016-5195-master | POC Details |
| 26 | Example exploit for CVE-2016-5195 | https://github.com/xpcmdshell/derpyc0w | POC Details |
| 27 | 编译好的脏牛漏洞(CVE-2016-5195)EXP | https://github.com/Brucetg/DirtyCow-EXP | POC Details |
| 28 | Linux 本地提权漏洞 | https://github.com/jas502n/CVE-2016-5195 | POC Details |
| 29 | 脏牛Linux本地提权漏洞复现(CVE-2016-5195) | https://github.com/imust6226/dirtcow | POC Details |
| 30 | Exploit the dirtycow vulnerability to login as root | https://github.com/zakariamaaraki/Dirty-COW-CVE-2016-5195- | POC Details |
| 31 | None | https://github.com/shanuka-ashen/Dirty-Cow-Explanation-CVE-2016-5195- | POC Details |
| 32 | This is a Dirty Cow (CVE-2016-5195) privilege escalation vulnerability exploit | https://github.com/dulanjaya23/Dirty-Cow-CVE-2016-5195- | POC Details |
| 33 | Dirtycow also is known as CVE-2016-5195 | https://github.com/KaviDk/dirtyCow | POC Details |
| 34 | DirtyCOW Exploit for Android | https://github.com/DanielEbert/CVE-2016-5195 | POC Details |
| 35 | my personal POC of CVE-2016-5195(dirtyCOW) | https://github.com/arttnba3/CVE-2016-5195 | POC Details |
| 36 | None | https://github.com/KasunPriyashan/Y2S1-Project-Linux-Exploitaion-using-CVE-2016-5195-Vulnerability | POC Details |
| 37 | An exploit script of CVE-2016-5195 | https://github.com/th3-5had0w/DirtyCOW-PoC | POC Details |
| 38 | PoC for Dirty COW (CVE-2016-5195) | https://github.com/vinspiert/scumjrs | POC Details |
| 39 | Dirty Cow CVE-2016-5195 Vulnerability | https://github.com/gurpreetsinghsaluja/dirtycow | POC Details |
| 40 | Ported golang version of dirtycow.c | https://github.com/TotallyNotAHaxxer/CVE-2016-5195 | POC Details |
| 41 | PoC for Dirty COW (CVE-2016-5195) | https://github.com/passionchenjianyegmail8/scumjrs | POC Details |
| 42 | The Repository contains documents that explains the explotation of CVE-2016-5195 | https://github.com/malinthag62/The-exploitation-of-Dirty-Cow-CVE-2016-5195 | POC Details |
| 43 | PoC for Dirty COW (CVE-2016-5195) | https://github.com/1equeneRise/scumjr9 | POC Details |
| 44 | Dirty Cow exploit - CVE-2016-5195 | https://github.com/flux10n/dirtycow | POC Details |
| 45 | None | https://github.com/fei9747/CVE-2016-5195 | POC Details |
| 46 | Below code takes advantage of a known vulnerability [Dirty COW (CVE-2016-5195)] 🔥 | https://github.com/LinuxKernelContent/DirtyCow | POC Details |
| 47 | None | https://github.com/NguyenCongHaiNam/Research-CVE-2016-5195 | POC Details |
| 48 | None | https://github.com/EDLLT/CVE-2016-5195-master | POC Details |
| 49 | More specific : Dirty COW (CVE-2016-5195) | https://github.com/sakilahamed/Linux-Kernel-Exploit-LAB | POC Details |
| 50 | DirtyCOW 笔记 | https://github.com/ASUKA39/CVE-2016-5195 | POC Details |
| 51 | None | https://github.com/B1ackCat/cve-2016-5195-DirtyCOW | POC Details |
| 52 | DirtyCow root privilege escalation (CVE-2016-5195) | https://github.com/talsim/root-dirtyc0w | POC Details |
| 53 | None | https://github.com/ZhiQiAnSecFork/DirtyCOW_CVE-2016-5195 | POC Details |
| 54 | None | https://github.com/h1n4mx0/Research-CVE-2016-5195 | POC Details |
| 55 | One-Click-Root program based on CVE-2016-5195, that works on the old 'PlayStation Certified' android devices | https://github.com/LiEnby/PSSRoot | POC Details |
| 56 | CVE-2016-5195 linux kernel exploit | https://github.com/0x3n19m4/CVE-2016-5195 | POC Details |
| 57 | Exploit para escalada de privilegios en Linux basado en la vulnerabilidad Dirty Cow (CVE-2016-5195). Incluye binario, código fuente e instrucciones para su uso en entornos controlados. | https://github.com/Samuel-G3/Escalamiento-de-Privilegios-usando-el-Kernel-Exploit-Dirty-Cow | POC Details |
| 58 | Educational PoC for Dirty COW (CVE-2016-5195) with logging, ptrace fallback, and binary payload support. | https://github.com/mohammadamin382/dirtycow-lab | POC Details |
| 59 | Explotación vulnerabilidad Dirty COW (CVE-2016-5195) en Ubuntu 16.04.1. | https://github.com/MarioAlejos-Cs/dirtycow-lab | POC Details |
| 60 | Linux privilege escalation using Dirty COW exploit (CVE-2016-5195). | https://github.com/pardhu045/linux-privilege-escalation | POC Details |
| 61 | Proyecto para 4Geeks de escalada de privilegios uando el Kernel Exploit Dirty Cow (CVE-2016-5195). | https://github.com/arturomartinvegue/escalada-privilegios-kernel-exploit-dirty-cow | POC Details |
| 62 | Penetration testing challenge covering web exploitation, binary reverse engineering, buffer overflow attacks, and privilege escalation through CVE-2016-5195 (Dirty COW). | https://github.com/Nathanloupy/42adv_boot2root | POC Details |
| 63 | Dirty Cow exploit - CVE-2016-5195 | https://github.com/ramahmdr/dirtycow | POC Details |
| 64 | Dirty COW Privilege Escalation (CVE-2016-5195) | https://github.com/elhaddadalaa788-alt/kernel-exploit-dirtycow-project-subm | POC Details |
| 65 | None | https://github.com/theo543/OSDS_Paper_CVE-2016-5195 | POC Details |
No public POC found.
Login to generate AI POCHello friends! I came across a 169 valuable website that I think you should visit. This tool is packed with a lot of useful information that you might find valuable. It has everything you could possibly need, so be sure to give it a visit! <a href=https://www.bumppy.com/the-interplay-of-business-and-technology-transforming-industries-and-driving-innovation/>https://www.bumppy.com/the-interplay-of-business-and-technology-transforming-industries-and-driving-innovation/</a> Additionally remember not to forget, folks, which you constantly are able to in the article find responses for the most the very complicated queries. We made an effort to explain all of the information using an extremely understandable way.