Peneter Tools – Telegram
Security researchers discovered 3 vulnerabilities in the Linux kernel that could allow a local attacker to elevate privileges and potentially execute malicious code. The proof-of-concept code is publicly available increasing the likelihood of exploitation in the wild.

https://github.com/greek0x0/2022-LPE-UAF

https://zplin.me/papers/DirtyCred-Zhenpeng.pdf

#LPE
The sources of the Linux kernel exploitation technique called DirtyCred are now on GitHub. The attack, which was presented at Black Hat 2022 security conference, is a kernel exploitation concept that swaps unprivileged kernel credentials with privileged ones to escalate privileges without overwriting any critical data on the kernel heap.

https://github.com/Markakd/DirtyCred
#LPE