![HackTheBox Write-Up — Nineveh. Nineveh is a machine vulnerable to… | by Bradley Fell, @FellSEC | Medium HackTheBox Write-Up — Nineveh. Nineveh is a machine vulnerable to… | by Bradley Fell, @FellSEC | Medium](https://miro.medium.com/fit/c/224/224/1*GWI-fh0BBJgUuuhx_bB2xg.png)
HackTheBox Write-Up — Nineveh. Nineveh is a machine vulnerable to… | by Bradley Fell, @FellSEC | Medium
GitHub - jiayy/android_vuln_poc-exp: This project contains pocs and exploits for vulneribilities I found (mostly)
grsecurity-101-tutorials/kernel_vuln_exp.md at master · hardenedlinux/grsecurity-101-tutorials · GitHub
![x0rz on Twitter: "CVE-2017-6074: DCCP double-free vulnerability (local root), works for #Linux >2.6.18, public PoC soon https://t.co/kdKlBKfrla #vulnerability https://t.co/GVUPm4agff" / Twitter x0rz on Twitter: "CVE-2017-6074: DCCP double-free vulnerability (local root), works for #Linux >2.6.18, public PoC soon https://t.co/kdKlBKfrla #vulnerability https://t.co/GVUPm4agff" / Twitter](https://pbs.twimg.com/media/C5RwouNWAAEpM6b.jpg)
x0rz on Twitter: "CVE-2017-6074: DCCP double-free vulnerability (local root), works for #Linux >2.6.18, public PoC soon https://t.co/kdKlBKfrla #vulnerability https://t.co/GVUPm4agff" / Twitter
![PDF) Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes PDF) Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes](https://i1.rgstatic.net/publication/342450105_Additional_kernel_observer_privilege_escalation_attack_prevention_mechanism_focusing_on_system_call_privilege_changes/links/5ef4daea92851c52d6fdabf8/largepreview.png)