Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2022-0847

Description

A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.

POC

Reference

- http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html

- http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html

- http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html

- http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html

- https://dirtypipe.cm4all.com/

Github

- https://github.com/0day404/vulnerability-poc

- https://github.com/0x7n6/OSCP

- https://github.com/0xIronGoat/dirty-pipe

- https://github.com/0xMarcio/cve

- https://github.com/0xStrygwyr/OSCP-Guide

- https://github.com/0xTen/pwn-gym

- https://github.com/0xZipp0/OSCP

- https://github.com/0xeremus/dirty-pipe-poc

- https://github.com/0xfke/500-free-TryHackMe-rooms

- https://github.com/0xkarthi/Tryhackme-Roadmap

- https://github.com/0xneobyte/TryHackMe-Learning-Path-From-Beginner-to-Expert

- https://github.com/0xor0ne/awesome-list

- https://github.com/0xr1l3s/CVE-2022-0847

- https://github.com/0xsmirk/vehicle-kernel-exploit

- https://github.com/0xsyr0/OSCP

- https://github.com/1Xnes/ctf-solving-tips

- https://github.com/20142995/sectool

- https://github.com/2xYuan/CVE-2022-0847

- https://github.com/4O4errorrr/TP_be_root

- https://github.com/4bhishek0/CVE-2022-0847-Poc

- https://github.com/4luc4rdr5290/CVE-2022-0847

- https://github.com/5thphlame/Free-Rooms-TryHackMe

- https://github.com/7imbitz/XCalate

- https://github.com/AMatheusFeitosaM/OSCP-Cheat

- https://github.com/ARESHAmohanad/THM

- https://github.com/ARESHAmohanad/tryhackme

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/AbdoFarid1/R00tKeep3r

- https://github.com/Abdulaziz-AlZabin/IEEE_Questions

- https://github.com/Abhi-1712/ejpt-roadmap

- https://github.com/AgustinESI/CVE-2022-1329

- https://github.com/Aijoo100/Aijoo100

- https://github.com/Al1ex/CVE-2022-0847

- https://github.com/Al1ex/LinuxEelvation

- https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits

- https://github.com/AlienTec1908/Comingsoon_HackMyVM_Easy

- https://github.com/AlienTec1908/Confusion_HackMyVM_Medium

- https://github.com/AlienTec1908/DarkMatter_HackMyVM_Hard

- https://github.com/AlienTec1908/Immortal_HackMyVM_Medium

- https://github.com/AlienTec1908/Juggling_HackMyVM_Hard

- https://github.com/AlienTec1908/Kitty_HackMyVM_Hard

- https://github.com/AlienTec1908/Messages_HackMyVM_Medium

- https://github.com/Amit29533/Global-Attack-Map

- https://github.com/AnastasiaLomova/PR1

- https://github.com/AnastasiaLomova/PR1.1

- https://github.com/Andromeda254/cve

- https://github.com/AnonymousCTF/TryHackMe-Roadmap

- https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit

- https://github.com/ArrestX/--POC

- https://github.com/Asbatel/CBDS_CVE-2022-0847_POC

- https://github.com/Awrrays/Pentest-Tips

- https://github.com/AyoubNajim/cve-2022-0847dirtypipe-exploit

- https://github.com/BEPb/tryhackme

- https://github.com/Bhagat-CyberWala/TryHackMe-Free-Roadmap

- https://github.com/BlessedRebuS/OSCP-Pentesting-Cheatsheet

- https://github.com/BlizzardEternity/CVE-2022-0847

- https://github.com/BlizzardEternity/DirtyPipe-Android

- https://github.com/BlizzardEternity/dirtypipez-exploit

- https://github.com/Brinmon/KernelStu

- https://github.com/ButchBytes-sec/TryHackMe

- https://github.com/CPT-Jack-A-Castle/CVE-2022-0847

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/CYB3RK1D/CVE-2022-0847-POC

- https://github.com/CYBER-PUBLIC-SCHOOL/linux-privilege-escalation-cheatsheet

- https://github.com/Ch4nc3n/PublicExploitation

- https://github.com/CharonDefalt/linux-exploit

- https://github.com/Chris-DiCarlo/Lets-Defend-Kernel-Exploit-Write-up

- https://github.com/CracksoftShlok/LinuxPrivEscResearch

- https://github.com/CybVulnHunter/TryhackME_Rooms

- https://github.com/DanaEpp/pwncat_dirtypipe

- https://github.com/Daniel-Ayz/OSCP

- https://github.com/DanielShmu/OSCP-Cheat-Sheet

- https://github.com/DarknessAdvances/model_search2

- https://github.com/DataDog/dirtypipe-container-breakout-poc

- https://github.com/DataFox/CVE-2022-0847

- https://github.com/DelphineTan/CVE-Research-Writeups

- https://github.com/DelphineTan/DelphineTan

- https://github.com/DelphineTan/Murdoch-CVE-2022-0847

- https://github.com/Desofori/Tryhackme-RoadMap

- https://github.com/DevataDev/PiracyTools

- https://github.com/Dh4v4l8/TRYHACKME-ROOMS

- https://github.com/Disturbante/Linux-Pentest

- https://github.com/DylanBarbe/dirty-pipe-clone-4-root

- https://github.com/DylanBarbe/hj

- https://github.com/EGI-Federation/SVG-advisories

- https://github.com/EagleTube/CVE-2022-0847

- https://github.com/EnriqueSanchezdelVillar/NotesHck

- https://github.com/EssenceCyber/Exploit-List

- https://github.com/Faizan-Khanx/OSCP

- https://github.com/FeFi7/attacking_embedded_linux

- https://github.com/FedericoGaribay/Tarea-exploit

- https://github.com/FirikiIntelligence/Courses

- https://github.com/Getshell/LinuxTQ

- https://github.com/GhostTroops/TOP

- https://github.com/GibzB/THM-Captured-Rooms

- https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe

- https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe-

- https://github.com/Gustavo-Nogueira/Dirty-Pipe-Exploits

- https://github.com/HK4040/ssh_bootcamp

- https://github.com/Ha0-Y/LinuxKernelExploits

- https://github.com/Ha0-Y/kernel-exploit-cve

- https://github.com/HadessCS/Awesome-Privilege-Escalation

- https://github.com/HaxorSecInfec/autoroot.sh

- https://github.com/Hunterdii/TryHackMe-Roadmap

- https://github.com/Hunterdii/tryhackme-free-rooms

- https://github.com/IHenakaarachchi/debian11-dirty_pipe-patcher

- https://github.com/ITMarcin2211/CVE-2022-0847-DirtyPipe-Exploit

- https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation

- https://github.com/Ignitetechnologies/Linux-Privilege-Escalation

- https://github.com/JERRY123S/all-poc

- https://github.com/JFR-C/Boot2root-CTFs-Writeups

- https://github.com/Jalexander798/JA_Tools-Cybersecurity-Resource-2

- https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups

- https://github.com/JlSakuya/CVE-2022-0847-container-escape

- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits

- https://github.com/Julien9969/INF8602_project

- https://github.com/JustinYe377/CTF-CVE-2022-0847

- https://github.com/KayCHENvip/vulnerability-poc

- https://github.com/KerFew/TryHackMeFreePath

- https://github.com/Kiosec/Linux-Exploitation

- https://github.com/LP-H4cmilo/CVE-2022-0847_DirtyPipe_Exploits

- https://github.com/LouisLiuNova/container-escape-exploits

- https://github.com/LudovicPatho/CVE-2022-0847

- https://github.com/LudovicPatho/CVE-2022-0847_dirty-pipe

- https://github.com/Ly0nt4r/OSCP

- https://github.com/MCANMCAN/TheDirtyPipeExploit

- https://github.com/MGamalCYSEC/ExploitFix-Linux

- https://github.com/Mag1cByt3s/MagicLinPwn

- https://github.com/Maikefee/linux-exploit-hunter

- https://github.com/Maissacrement/cyber_sec_master_spv

- https://github.com/ManciSee/M6__Insecure_Authorization

- https://github.com/Mangesh-Bhattacharya/TryHackMe-Roadmap

- https://github.com/Meowmycks/OSCPprep-Cute

- https://github.com/Meowmycks/OSCPprep-Sar

- https://github.com/Meowmycks/OSCPprep-hackme1

- https://github.com/Mephierr/DirtyPipe_exploit

- https://github.com/Metarget/metarget

- https://github.com/MinLouisCyber/500-free-TryHackMe-rooms

- https://github.com/Miraitowa70/POC-Notes

- https://github.com/Mohammed-Hafeez-99/THM-checklist

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker

- https://github.com/Mustafa1986/CVE-2022-0847-DirtyPipe-Exploit

- https://github.com/NaInSec/CVE-PoC-in-GitHub

- https://github.com/Nekoox/dirty-pipe

- https://github.com/NetKingJ/awesome-android-security

- https://github.com/NxPnch/Linux-Privesc

- https://github.com/OlegBr04/Traitor

- https://github.com/Ossito/pentest-notes

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/Patocoh/Research-Dirty-Pipe

- https://github.com/PenTestical/linpwn

- https://github.com/Pratham-verma/TryHackMe-Roadmap

- https://github.com/ProbiusOfficial/Awsome-Sec.CTF-Videomaker

- https://github.com/PsychoH4x0r/Unknown1337-Auto-Root-

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/Qian-YM/Vulnerability-Assessment

- https://github.com/Qwertozavr/PR1_3

- https://github.com/Qwertozavr/PR1_3.2

- https://github.com/Qwertozavr/PR1_TRPP

- https://github.com/RACHO-PRG/Linux_Escalada_Privilegios

- https://github.com/ReflectedThanatos/OSCP-cheatsheet

- https://github.com/RogelioPumajulca/CVE-2022-0847

- https://github.com/S3cur3Th1sSh1t/My-starred-Repositories

- https://github.com/SYRTI/POC_to_review

- https://github.com/SantoriuHen/NotesHck

- https://github.com/Scouserr/cve-2022-0847-poc-dockerimage

- https://github.com/SenukDias/OSCP_cheat

- https://github.com/Shadow-Spinner/CVE-2022-0847

- https://github.com/Shadowven/Vulnerability_Reproduction

- https://github.com/ShaharyarJalaluddin/cve20220847

- https://github.com/Shayanschakravarthy/tryhackme-free-rooms

- https://github.com/Shinbatsu/awesome-tryhackme

- https://github.com/Shinbatsu/tryhackme-awesome

- https://github.com/Shotokhan/cve_2022_0847_shellcode

- https://github.com/SinMaven/BugSauce

- https://github.com/SirElmard/ethical_hacking

- https://github.com/SnailDev/github-hot-hub

- https://github.com/Snoopy-Sec/Localroot-ALL-CVE

- https://github.com/SpriteCT/TryHackMe

- https://github.com/T4t4ru/CVE-2022-0847

- https://github.com/Tanq16/link-hub

- https://github.com/Technetium1/stars

- https://github.com/Threekiii/Awesome-POC

- https://github.com/Tom-Riddle-4/IEEE_Questions

- https://github.com/Trickhish/automated_privilege_escalation

- https://github.com/Turzum/ps-lab-cve-2022-0847

- https://github.com/Udyz/CVE-2022-0847

- https://github.com/UgoDasseleer/write-up-Intermediate-Nmap

- https://github.com/V0WKeep3r/CVE-2022-0847-DirtyPipe-Exploit

- https://github.com/VISHALSB85/ejpt-roadmap

- https://github.com/Valay-2004/THM-Learning-PATH-Beginner-to-Expert-

- https://github.com/ValentinKolb/docker-demo

- https://github.com/VinuKalana/DirtyPipe-CVE-2022-0847

- https://github.com/VishuGahlyan/OSCP

- https://github.com/WhooAmii/POC_to_review

- https://github.com/WilliamQ28/Worst-autoLinPrivesc

- https://github.com/XiaomingX/awesome-poc-for-red-team

- https://github.com/XiaozaYa/CVE-Recording

- https://github.com/XinLiu2025/openkylinsat

- https://github.com/XmasSnowISBACK/CVE-2022-0847-DirtyPipe-Exploits

- https://github.com/Yakovyakov/NetFuzzAI

- https://github.com/YoanYord/youctfone

- https://github.com/ZWDeJun/ZWDeJun

- https://github.com/ZZ-SOCMAP/CVE-2022-0847

- https://github.com/Zen-ctrl/Rutgers_Cyber_Range

- https://github.com/a-roshbaik/Linux-Privilege-Escalation-Exploits

- https://github.com/abhi-ingle/ejpt-roadmap

- https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground

- https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground

- https://github.com/adnan-kutay-yuksel/tryhackme-all-rooms-database

- https://github.com/ahrixia/CVE_2022_0847

- https://github.com/airbus-cert/dirtypipe-ebpf_detection

- https://github.com/ajith737/Dirty-Pipe-CVE-2022-0847-POCs

- https://github.com/akyuksel/tryhackme-all-rooms-database

- https://github.com/al4xs/CVE-2022-0847-Dirty-Pipe

- https://github.com/anan123jhbjb/project01

- https://github.com/anik-chy/Final-project-6130

- https://github.com/antx-code/CVE-2022-0847

- https://github.com/arrdyas/planner

- https://github.com/arttnba3/CVE-2022-0847

- https://github.com/aruncs31s/Ethical-h4ckers.github.io

- https://github.com/aruncs31s/ethical-hacking

- https://github.com/atksh/Dirty-Pipe-sudo-poc

- https://github.com/ayushx007/CVE-2022-0847-DirtyPipe-Exploits

- https://github.com/ayushx007/CVE-2022-0847-dirty-pipe-checker

- https://github.com/b4dboy17/Dirty-Pipe-Oneshot

- https://github.com/babyshen/CVE-2022-0847

- https://github.com/bachkhoasoft/awesome-list-ks

- https://github.com/badboy-sft/Dirty-Pipe-Oneshot

- https://github.com/badboycxcc/script

- https://github.com/badigervijay/AI-Based-Threat-Intelligence-Platform

- https://github.com/balajiuk14/tryhackmelearningpath

- https://github.com/basharkey/CVE-2022-0847-dirty-pipe-checker

- https://github.com/bbaranoff/CVE-2022-0847

- https://github.com/beruangsalju/LocalPrivelegeEscalation

- https://github.com/beruangsalju/LocalPrivilegeEscalation

- https://github.com/beycanyildiz/TryHackMeRoadmap

- https://github.com/bhagat8920/TryHackMe-Free-Roadmap

- https://github.com/binganao/vulns-2022

- https://github.com/bohr777/cve-2022-0847dirtypipe-exploit

- https://github.com/boniyeamincse/tryhackmefreeroom

- https://github.com/boy-hack/zsxq

- https://github.com/brant-ruan/poc-demo

- https://github.com/breachnix/dirty-pipe-poc

- https://github.com/bsauce/kernel-exploit-factory

- https://github.com/bsauce/kernel-security-learning

- https://github.com/bsjohnson20/rubberducky2

- https://github.com/bugbounty88/dirtypipe_exploit

- https://github.com/byteReaper77/Dirty-Pipe

- https://github.com/c0ntempt/CVE-2022-0847

- https://github.com/carlcedin/moe-demo

- https://github.com/carlosevieira/Dirty-Pipe

- https://github.com/ch1lL9uy/TTCS

- https://github.com/chandanmallick19/TryHackMe

- https://github.com/chenaotian/CVE-2022-0185

- https://github.com/chenaotian/CVE-2022-0847

- https://github.com/chrisregy23/A-Comprehensive-Approach-to-Container-Security

- https://github.com/christian-byrne/custom-nodes-security-scan

- https://github.com/christian-byrne/node-sec-scan

- https://github.com/cont3mpt/CVE-2022-0847

- https://github.com/cookiengineer/goroot

- https://github.com/cookiengineer/groot

- https://github.com/crac-learning/CVE-analysis-reports

- https://github.com/crowsec-edtech/Dirty-Pipe

- https://github.com/crusoe112/DirtyPipePython

- https://github.com/cspshivam/CVE-2022-0847-dirty-pipe-exploit

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/cypherlobo/DirtyPipe-BSI

- https://github.com/d-rn/vulBox

- https://github.com/d4n-sec/d4n-sec.github.io

- https://github.com/d4redevilx/OSCP-CheetSheet

- https://github.com/dadhee/CVE-2022-0847_DirtyPipeExploit

- https://github.com/damarant/CTF

- https://github.com/dasarivarunreddy/Tryhackme-RoadMap

- https://github.com/dasarivarunreddy/free-rooms-tryhackme

- https://github.com/decrypthing/CVE_2022_0847

- https://github.com/drapl0n/dirtypipe

- https://github.com/e-hakson/OSCP

- https://github.com/edr1412/Dirty-Pipe

- https://github.com/edsonjt81/CVE-2022-0847-DirtyPipe-

- https://github.com/edsonjt81/CVE-2022-0847-Linux

- https://github.com/edsonjt81/Linux-Privilege-Escalation

- https://github.com/eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits

- https://github.com/edwinantony1995/Tryhackme

- https://github.com/eljosep/OSCP-Guide

- https://github.com/emmaneugene/CS443-project

- https://github.com/eremus-dev/Dirty-Pipe-sudo-poc

- https://github.com/eric-glb/dirtypipe

- https://github.com/exfilt/CheatSheet

- https://github.com/fazilbaig1/oscp

- https://github.com/fckoo/pwn-gym

- https://github.com/febinrev/dirtypipez-exploit

- https://github.com/felixfu59/kernel-hack

- https://github.com/flux10n/CVE-2022-0847-DirtyPipe-Exploits

- https://github.com/freitzzz/stars

- https://github.com/fwuest/opencti-homelab-demo

- https://github.com/giterlizzi/secdb-feeds

- https://github.com/githublihaha/DirtyPIPE-CVE-2022-0847

- https://github.com/greenhandatsjtu/CVE-2022-0847-Container-Escape

- https://github.com/gyaansastra/CVE-2022-0847

- https://github.com/h0pe-ay/Vulnerability-Reproduction

- https://github.com/h4ckm310n/CVE-2022-0847-eBPF

- https://github.com/h4ckm310n/Container-Vulnerability-Exploit

- https://github.com/hardenedvault/vault_range_poc

- https://github.com/hegusung/netscan

- https://github.com/hheeyywweellccoommee/CVE-2022-0847-gfobj

- https://github.com/hktalent/TOP

- https://github.com/hktalent/bug-bounty

- https://github.com/hoanbi1812000/hoanbi1812000

- https://github.com/hugefiver/mystars

- https://github.com/hugs42/infosec

- https://github.com/hxlxmj/TheDirtyPipeExploit

- https://github.com/hxlxmjxbbxs/TheDirtyPipeExploit

- https://github.com/iandrade87br/OSCP

- https://github.com/icontempt/CVE-2022-0847

- https://github.com/ih3na/debian11-dirty_pipe-patcher

- https://github.com/ihenakaarachchi/debian11-dirty_pipe-patcher

- https://github.com/imfiver/CVE-2022-0847

- https://github.com/imsalimansari/Try-Hack-Me-Roadmap

- https://github.com/iohubos/iohubos

- https://github.com/iridium-soda/container-escape-exploits

- https://github.com/irwx777/CVE-2022-0847

- https://github.com/isaiahsimeone/COMP3320-VAPT

- https://github.com/ishowcybersecurity/TryHackMe-Beginner-Roadmap

- https://github.com/jamesbrunet/dirtypipe-writeup

- https://github.com/jaspreet-infosec/TryHackMe-Roadmap

- https://github.com/jbmihoub/all-poc

- https://github.com/jithinroywc03/CTF

- https://github.com/jitmondal1/OSCP

- https://github.com/joaomagfreitas/stars

- https://github.com/joeymeech/CVE-2022-0847-Exploit-Implementation

- https://github.com/jonathanbest7/cve-2022-0847

- https://github.com/jpts/CVE-2022-0847-DirtyPipe-Container-Breakout

- https://github.com/julecko/disgomoji

- https://github.com/jxpsx/CVE-2022-0847-DirtyPipe-Exploits

- https://github.com/k0mi-tg/CVE-POC

- https://github.com/k46th1/Tryhackme-Roadmap

- https://github.com/k4r7h1kn/Tryhackme-Roadmap

- https://github.com/k4r7hx/Tryhackme-Roadmap

- https://github.com/kaosagnt/ansible-everyday

- https://github.com/karanlvm/DirtyPipe-Exploit

- https://github.com/karimhabush/cyberowl

- https://github.com/kdn111/linux-kernel-exploitation

- https://github.com/kgwanjala/oscp-cheatsheet

- https://github.com/khanhdn111/linux-kernel-exploitation

- https://github.com/khanhdz-06/linux-kernel-exploitation

- https://github.com/khanhdz191/linux-kernel-exploitation

- https://github.com/khanhhdz/linux-kernel-exploitation

- https://github.com/khanhhdz06/linux-kernel-exploitation

- https://github.com/khanhnd123/linux-kernel-exploitation

- https://github.com/khansiddique/VulnHub-Boot2root-CTFs-Writeups

- https://github.com/khnhdz/linux-kernel-exploitation

- https://github.com/knd06/linux-kernel-exploitation

- https://github.com/knqyf263/CVE-2022-0847

- https://github.com/krazystar55/tryhackme

- https://github.com/kun-g/Scraping-Github-trending

- https://github.com/kur00n3k0/dirty-pipe-otw

- https://github.com/kwxk/Rutgers_Cyber_Range

- https://github.com/ldrx30/LinuxKernelExploits

- https://github.com/leoambrus/CheckersNomisec

- https://github.com/letsr00t/CVE-2022-0847

- https://github.com/lewiswu1209/sif

- https://github.com/liamg/liamg

- https://github.com/liamg/traitor

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/logit507/logit507

- https://github.com/logm1lo/CVE-2022-0847_DirtyPipe_Exploits

- https://github.com/lonnyzhang423/github-hot-hub

- https://github.com/lucksec/CVE-2022-0847

- https://github.com/ma7moudShaaban/R00tKeep3r

- https://github.com/makoto56/penetration-suite-toolkit

- https://github.com/manas3c/CVE-POC

- https://github.com/manoj3768/OSCP

- https://github.com/marksowell/my-stars

- https://github.com/marksowell/starred

- https://github.com/marksowell/stars

- https://github.com/mccarthurmay/PenTesting

- https://github.com/merlinepedra/TRAITOR

- https://github.com/merlinepedra25/TRAITOR

- https://github.com/mhanief/dirtypipe

- https://github.com/michaelklaan/CVE-2022-0847-Dirty-Pipe

- https://github.com/mithunmadhukuttan/Dirty-Pipe-Exploit

- https://github.com/morgenm/dirtypipe

- https://github.com/morgenm/portfolio

- https://github.com/mrchucu1/CVE-2022-0847-Docker

- https://github.com/mrchucu1/mrchucu1

- https://github.com/muhammad1596/CVE-2022-0847-DirtyPipe-Exploits

- https://github.com/muhammad1596/CVE-2022-0847-dirty-pipe-checker

- https://github.com/murchie85/twitterCyberMonitor

- https://github.com/mutur4/CVE-2022-0847

- https://github.com/n3rada/DirtyPipe

- https://github.com/nanaao/Dirtypipe-exploit

- https://github.com/nanaao/dirtyPipe-automaticRoot

- https://github.com/nanasarpong024/tryhackme

- https://github.com/ndk06/linux-kernel-exploitation

- https://github.com/ndk191/linux-kernel-exploitation

- https://github.com/neargle/re0-kubernetes-sec-archive

- https://github.com/nidhi7598/linux-4.19.72_lib_CVE-2022-0847

- https://github.com/nisadevi11/Localroot-ALL-CVE

- https://github.com/nitishbadole/oscp-note-3

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/notl0cal/dpipe

- https://github.com/notmariekondo/notmariekondo

- https://github.com/nu1l-ptr/CVE-2022-0847-Poc

- https://github.com/nyxragon/ejpt-roadmap

- https://github.com/ochysbliss/My-Tryhackme-

- https://github.com/omaradds1/THM

- https://github.com/orsuprasad/CVE-2022-0847-DirtyPipe-Exploits

- https://github.com/oscpname/OSCP_cheat

- https://github.com/osungjinwoo/CVE-2022-0847-Dirty-Pipe

- https://github.com/pakkiraja/TryHackMe_Modules

- https://github.com/parkjunmin/CTI-Search-Criminalip-Search-Tool

- https://github.com/parth45/cheatsheet

- https://github.com/pashayogi/DirtyPipe

- https://github.com/patrickl1u/CS179F-Dirty-Pipe-Exploit

- https://github.com/pen4uin/awesome-cloud-native-security

- https://github.com/pen4uin/cloud-native-security

- https://github.com/pentestblogin/pentestblog-CVE-2022-0847

- https://github.com/pentestfunctions/thm-room-points

- https://github.com/peterspbr/dirty-pipe-otw

- https://github.com/phuonguno98/CVE-2022-0847-DirtyPipe-Exploits

- https://github.com/pipiscrew/timeline

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/pmihsan/Dirty-Pipe-CVE-2022-0847

- https://github.com/polygraphene/DirtyPipe-Android

- https://github.com/pranjalsharma03/OSCP

- https://github.com/promise2k/OSCP

- https://github.com/puckiestyle/CVE-2022-0847

- https://github.com/qdagustian/CVE_2022_0847

- https://github.com/qqdagustian/CVE_2022_0847

- https://github.com/qwert419/linux-

- https://github.com/r1is/CVE-2022-0847

- https://github.com/r3ds3ctor/PulseCheck

- https://github.com/rahul1406/cve-2022-0847dirtypipe-exploit

- https://github.com/raohemanth/cybersec-dirty-pipe-vulnerability

- https://github.com/realbatuhan/dirtypipetester

- https://github.com/reptile0bug/Tryhackme-RoadMap

- https://github.com/revanmalang/OSCP

- https://github.com/rexpository/linux-privilege-escalation

- https://github.com/rishabatra1802/TryHackMe_FreeRooms

- https://github.com/rng70/TryHackMe-Roadmap

- https://github.com/s3mPr1linux/CVE_2022_0847

- https://github.com/sa-infinity8888/Dirty-Pipe-CVE-2022-0847

- https://github.com/sarthakpriyadarshi/Obsidian-OSCP-Notes

- https://github.com/sarutobi12/sarutobi12

- https://github.com/schoi1337/dockout

- https://github.com/scopion/dirty-pipe

- https://github.com/sengpakrenha/tryhackeme

- https://github.com/si1ent-le/CVE-2022-0847

- https://github.com/siberiah0h/CVE-CNVD-HUB

- https://github.com/siegfrkn/CSCI5403_CVE20220847_Detection

- https://github.com/silentfalcon/eJPT-v12-Roadmap

- https://github.com/smile-e3/vehicle-kernel-exploit

- https://github.com/solomon12354/CVE-2022-0847-Dirty_Pipe_virus

- https://github.com/solomon12354/LockingGirl-----CVE-2022-0847-Dirty_Pipe_virus

- https://github.com/soosmile/POC

- https://github.com/source-xu/docker-vuls

- https://github.com/sourcexu7/docker-vuls

- https://github.com/ssr-111/linux-kernel-exploitation

- https://github.com/stefanoleggio/dirty-pipe-cola

- https://github.com/stfnw/Debugging_Dirty_Pipe_CVE-2022-0847

- https://github.com/sumin-world/linux-kernel-exploits

- https://github.com/taielab/awesome-hacking-lists

- https://github.com/talent-x90c/cve_list

- https://github.com/tanjiti/sec_profile

- https://github.com/teamssix/container-escape-check

- https://github.com/terabitSec/dirtyPipe-automaticRoot

- https://github.com/tharushkadinujaya05/TryHackMe-Learning-Path-From-Beginner-to-Expert

- https://github.com/thebugbounter/TryHackMe-Roadmap

- https://github.com/theo-goetzinger/TP_be_root

- https://github.com/thesakibrahman/THM-Free-Room

- https://github.com/thmrevenant/tryhackme

- https://github.com/tiann/DirtyPipeRoot

- https://github.com/tmoneypenny/CVE-2022-0847

- https://github.com/tnishiox/kernelcare-playground

- https://github.com/trhacknon/CVE-2022-0847-DirtyPipe-Exploit

- https://github.com/trhacknon/Pocingit

- https://github.com/trhacknon/dirtypipez-exploit

- https://github.com/tstromberg/ioc-bench

- https://github.com/tstromberg/ttp-bench

- https://github.com/tufanturhan/CVE-2022-0847-L-nux-PrivEsc

- https://github.com/txuswashere/OSCP

- https://github.com/uhub/awesome-c

- https://github.com/ukmihiran/Rubber_Ducky_Payloads

- https://github.com/unkn0wn-r1d3r/THOLVI-LinX-V1.0

- https://github.com/unkn0wn-r1d3r/Tholvi-Docker-1

- https://github.com/uttambodara/TryHackMeRoadmap

- https://github.com/veritas501/pipe-primitive

- https://github.com/versatilexec/CVE_2022_0847

- https://github.com/vishal-s-b/ejpt-roadmap

- https://github.com/vknc/vknc.github.io

- https://github.com/vlain1337/auto-lpe

- https://github.com/wechicken456/Linux-kernel

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/whoami-chmod777/Hacking-Articles-Linux-Privilege-Escalation-

- https://github.com/whoforget/CVE-POC

- https://github.com/wkhnh06/linux-kernel-exploitation

- https://github.com/wpressly/exploitations

- https://github.com/x90hack/vulnerabilty_lab

- https://github.com/xAKSx/TryHackMe

- https://github.com/xSecHoussam/BugBountyTips

- https://github.com/xairy/linux-kernel-exploitation

- https://github.com/xasyhack/oscp2025

- https://github.com/xasyhack/oscp_cheat_sheet_2025

- https://github.com/xcode96/REDME

- https://github.com/xhref/OSCP

- https://github.com/xnderLAN/CVE-2022-0847

- https://github.com/xndpxs/CVE-2022-0847

- https://github.com/xsudoxx/OSCP

- https://github.com/xsxtw/CVE-2022-0847

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/yoeelingBin/CVE-2022-0847-Container-Escape

- https://github.com/youwizard/CVE-POC

- https://github.com/z3dc0ps/awesome-linux-exploits

- https://github.com/zecool/cve

- https://github.com/zh3ngn1u/Autoroot-Server

- https://github.com/zh3ngn1u/autoroot-server

- https://github.com/zhanpengliu-tencent/medium-cve

- https://github.com/zzcentury/PublicExploitation

- https://github.com/zzzchuu/Dirty-Pipe