Home

Awesome

<h1 align="center">Localroot Collection ✨</h1> <p align="center"> <img width="350" align="center" src="https://2.bp.blogspot.com/-DuDjcFdRpNc/W86_xqFjs-I/AAAAAAAAAcs/CSGfbPm8br8GXDHNo9HDedrRYfvthr21wCK4BGAYYCw/s440/Lnx1.png" alt="pixelscoders" href="https://pixel-code.info"/> </p>

Linux

2001 //
2002 //
2003 //
2004 //
2005 //
2006 //
2007 //
2008 //
2009 //
2010 //
2011 //
2012 //
2013 //
2014 //
2015 //
2016 //
2017 //
2018 //
2019 //
2021 //
2022 //
2023 //
2024 //
Default

This exploit uses the pokemon exploit of the dirtycow vulnerability as a base and automatically generates a new passwd line. The user will be prompted for the new password when the binary is run. The original /etc/passwd file is then backed up to /tmp/paww.bak and overwrites the root account with the generated line. After running the exploit you should be able to login with the newly created user.

IBM AIX

FreeBSD

2005 //
2008 //
2009 //
2010 //
2011 //
2012 //
2013 //