Commit Graph

  • fa0228df9b release v0.9.3: CVE metadata refresh (KEV 10→12) + dirtydecrypt bug fix main v0.9.3 leviathan 2026-05-24 01:17:58 -04:00
  • d52fcd5512 docs: sweep stale counts to match v0.9.2 binary state leviathan 2026-05-24 00:09:21 -04:00
  • 66cca39a55 release v0.9.2: dirtydecrypt verified on mainline 6.19.7 (22 → 28) v0.9.2 leviathan 2026-05-24 00:03:35 -04:00
  • 92396a0d6d tests: fix 2 test rows with wrong expected verdicts (v0.9.0 regression) leviathan 2026-05-23 23:38:55 -04:00
  • 8ac041a295 release v0.9.1: VM verification sweep 22 → 27 v0.9.1 leviathan 2026-05-23 23:35:02 -04:00
  • 270ddc1681 verify-vm: per-module provisioner hook + old-mainline URL fallback leviathan 2026-05-23 22:36:02 -04:00
  • 7f4a6e1c7c pintheft: drop --full-chain stub (calls undefined finisher symbol) v0.9.0 leviathan 2026-05-23 22:22:31 -04:00
  • f41eed834e pintheft: add missing <sys/mman.h> for mmap/mprotect/PROT_* leviathan 2026-05-23 22:19:59 -04:00
  • d84b3b0033 release v0.9.0: 5 gap-fillers — every year 2016 → 2026 now covered leviathan 2026-05-23 22:15:44 -04:00
  • 4af82b82d9 docs: post-v0.7.1 surface sync (README + site + ROADMAP) leviathan 2026-05-23 21:27:23 -04:00
  • c12ee6055c release.yml: arm64-static via dockcross/linux-arm64-musl v0.7.1 leviathan 2026-05-23 21:17:03 -04:00
  • 3e9f373751 release.yml: arm64-static — give musl-gcc access to Linux uapi headers leviathan 2026-05-23 21:15:01 -04:00
  • 24c2821ae2 release.yml: arm64-static via musl-tools on ubuntu-24.04-arm (not Alpine) leviathan 2026-05-23 21:13:06 -04:00
  • 5d48a7b0b5 release v0.7.1: arm64-static binary + per-module arch_support leviathan 2026-05-23 21:10:54 -04:00
  • 18fa3025f2 ci: silence Annex K noise from clang-tidy leviathan 2026-05-23 20:58:03 -04:00
  • 5b79b23ff2 ci: ASan/UBSan + clang-tidy lint + weekly drift check leviathan 2026-05-23 20:46:27 -04:00
  • 264759832a release v0.7.0: 22-of-26 VM-verified + --explain + OPSEC + KEV metadata v0.7.0 leviathan 2026-05-23 20:44:45 -04:00
  • 6e0f811a2c README + site + binary: surface 22-of-26 VM-verified count leviathan 2026-05-23 18:03:38 -04:00
  • 312e7d89b5 verify-vm: kernel.ubuntu.com mainline integration — 22 modules verified leviathan 2026-05-23 17:35:13 -04:00
  • 2c131df1bf verify-vm sweep complete: 18 modules confirmed across 5 Linux distros leviathan 2026-05-23 16:29:50 -04:00
  • 48d5f15828 verify-vm sweep: 13 modules confirmed end-to-end + Vagrant fixes leviathan 2026-05-23 16:22:10 -04:00
  • 67d091dd37 verified_on table — 5 modules empirically confirmed in real VMs leviathan 2026-05-23 15:46:14 -04:00
  • f792a3c4a6 verify-vm: close the loop — first successful end-to-end VM verification leviathan 2026-05-23 15:26:51 -04:00
  • 2c4cde1031 verify-vm: fix Vagrantfile for first real run leviathan 2026-05-23 14:59:10 -04:00
  • 5071ad4ba9 site: marketing-grade redesign with --explain showcase + animated hero leviathan 2026-05-23 11:42:56 -04:00
  • 554a58757e tools/verify-vm: turnkey Vagrant + Parallels verification scaffolding leviathan 2026-05-23 11:19:28 -04:00
  • 8ab49f36f6 detection rules: complete sigma/yara/falco coverage across the corpus leviathan 2026-05-23 11:10:54 -04:00
  • ee3e7dd9a7 skeletonkey: --explain MODULE — single-page operator briefing leviathan 2026-05-23 10:49:46 -04:00
  • 39ce4dff09 modules: per-module OPSEC notes — telemetry footprint per exploit leviathan 2026-05-23 10:45:38 -04:00
  • e4a600fef2 module metadata: CWE + ATT&CK + CISA KEV triage from federal sources leviathan 2026-05-23 10:38:01 -04:00
  • 60d22eb4f6 core/host: add meltdown_mitigation passthrough + migrate entrybleed leviathan 2026-05-23 01:14:38 -04:00
  • e2fef41667 .gitignore: add /skeletonkey-test-kr (new kernel_range unit-test binary) leviathan 2026-05-23 01:09:40 -04:00
  • 8243817f7e test harness: kernel_range unit tests + coverage report + register_all helper leviathan 2026-05-23 01:09:30 -04:00
  • 8de46e212e kernel_range: refresh tables from Debian tracker — 5 MISSING adds + 4 off-by-one harmonisations leviathan 2026-05-23 00:58:04 -04:00
  • df4b879527 tools: refresh-kernel-ranges.py — Debian tracker drift detection leviathan 2026-05-23 00:52:10 -04:00
  • 6b6d638d98 .gitignore: exclude release build artifacts at repo root leviathan 2026-05-23 00:47:25 -04:00
  • 8938a74d04 detection rules: YARA + Falco for the 6 highest-rank modules + playbook leviathan 2026-05-23 00:47:13 -04:00
  • 027fc1f9dd release.yml: add static-musl x86_64 build (Alpine) leviathan 2026-05-23 00:30:13 -04:00
  • 72ac6f8774 install.sh: prefer x86_64-static binary by default (portable across libc versions) v0.6.2 leviathan 2026-05-23 00:28:36 -04:00
  • fde053a27e install.sh: POSIX-compatible 'set -o pipefail' so 'curl | sh' works v0.6.1 leviathan 2026-05-23 00:24:58 -04:00
  • 97be306fd2 release: bump version to v0.6.0 v0.6.0 leviathan 2026-05-23 00:22:18 -04:00
  • a9c8f7d8c6 tests: 5 happy-path VULNERABLE assertions (44 total) leviathan 2026-05-23 00:17:17 -04:00
  • 150f16bc97 pwnkit + sudoedit_editor: ctx->host migration + 4 more tests (39 total) leviathan 2026-05-23 00:15:01 -04:00
  • c63ee72aa1 docs: JSON output schema (consumer contract for --scan --json) leviathan 2026-05-23 00:07:45 -04:00
  • 86812b043d core/host: userspace version fingerprint (sudo, polkit) leviathan 2026-05-23 00:05:39 -04:00
  • 0d87cbc71c copy_fail_family: bridge-level userns gate + 4 new tests (33 total) leviathan 2026-05-23 00:02:23 -04:00
  • 2b1e96336e core/host: in_range helper + 13-module migration + 12 more tests (29 total) leviathan 2026-05-22 23:58:38 -04:00
  • 1571b88725 core/host: skeletonkey_host_kernel_at_least + 9 new detect() tests leviathan 2026-05-22 23:52:10 -04:00
  • 36814f272d modules: migrate remaining 22 modules to ctx->host fingerprint leviathan 2026-05-22 23:43:20 -04:00
  • d05a46c5c6 .gitignore: exclude skeletonkey-test build artifact leviathan 2026-05-22 23:32:23 -04:00
  • ea1744e6f0 tests: detect() unit harness with mocked ctx->host leviathan 2026-05-22 23:32:12 -04:00
  • c00c3b463a dispatcher: per-detect timeout + exploit() fork-isolation leviathan 2026-05-22 23:26:09 -04:00
  • 4f30d00a1c core/host: shared host fingerprint refactor leviathan 2026-05-22 23:18:00 -04:00
  • 3e6e0d869b skeletonkey: add --dry-run flag leviathan 2026-05-22 23:08:24 -04:00
  • a26f471ecf dirtydecrypt + fragnesia: pin CVE fix commits, version-based detect() leviathan 2026-05-22 23:06:15 -04:00
  • cdb8f5e8f9 all modules: wrap Linux-only code in #ifdef __linux__ — full macOS build works leviathan 2026-05-22 22:58:16 -04:00
  • 9a4cc91619 pack2theroot (CVE-2026-41651) + --auto accuracy work leviathan 2026-05-22 22:42:07 -04:00
  • ac557b67d0 review pass: fidelity + credits + count consistency for ported modules leviathan 2026-05-22 18:41:37 -04:00
  • a8c8d5ef1f modules: add dirtydecrypt (CVE-2026-31635) + fragnesia (CVE-2026-46300) leviathan 2026-05-22 18:22:30 -04:00
  • 3b287f84f0 copy_fail_family: skip DIRTYFAIL typed prompt under --i-know leviathan 2026-05-22 16:49:15 -04:00
  • 33f81aeb69 site: revert CVE table → pill grid leviathan 2026-05-17 02:25:25 -04:00
  • 5be3c46719 CONTRIBUTING: fix stale IAMROOT_EXPLOIT_OK → SKELETONKEY_EXPLOIT_OK leviathan 2026-05-17 02:24:06 -04:00
  • 58fb2e0951 site: simplify nav + add sortable CVE chart leviathan 2026-05-17 02:22:54 -04:00
  • 2904fa159c site: GitHub Pages landing page leviathan 2026-05-17 02:14:15 -04:00
  • 2873133852 README: polish — accurate counts, audience table, corpus glance leviathan 2026-05-17 02:02:50 -04:00
  • 95135213e5 launch: README polish + CONTRIBUTING + LAUNCH.md leviathan 2026-05-17 01:59:25 -04:00
  • 0fbe1b058f v0.5.0: --auto mode + sysadmin one-liner v0.5.0 leviathan 2026-05-17 01:55:13 -04:00
  • e13edd0cfd modules: add sudo_samedit + sequoia + sudoedit_editor + vmwgfx leviathan 2026-05-17 01:53:18 -04:00
  • 5a73565e0e scaffold: 4 new module dirs (sudo_samedit, sequoia, sudoedit_editor, vmwgfx) leviathan 2026-05-17 01:47:28 -04:00
  • 324b539d65 README: bump Status to v0.4.5 leviathan 2026-05-16 23:09:19 -04:00
  • e668c3301f banner: drop ASCII art, plain text only v0.4.5 leviathan 2026-05-16 23:05:40 -04:00
  • 347a9af832 banner: give the bit actual teeth v0.4.4 leviathan 2026-05-16 23:04:14 -04:00
  • 023289a03a banner: artwork is the focal point — plain SKELETONKEY text below v0.4.3 leviathan 2026-05-16 23:01:14 -04:00
  • e7ced5db7c banner: more detailed ornate skeleton key v0.4.2 leviathan 2026-05-16 22:57:01 -04:00
  • b5188b7818 banner: redesign skeleton key ASCII art v0.4.1 leviathan 2026-05-16 22:52:13 -04:00
  • 9593d90385 rename: IAMROOT → SKELETONKEY across the entire project v0.4.0 leviathan 2026-05-16 22:43:49 -04:00
  • 9d88b475c1 v0.3.1: --dump-offsets tool + NOTICE.md per module v0.3.1 leviathan 2026-05-16 22:33:43 -04:00
  • 1bcfdd0c9f release: v0.3.0 — 4 new CVE modules (24 total) v0.3.0 leviathan 2026-05-16 22:25:15 -04:00
  • 5a808e3583 modules: 4 new CVE modules — nft_set_uaf + af_unix_gc + nft_fwd_dup + nft_payload leviathan 2026-05-16 22:24:15 -04:00
  • 6a0a7d8718 scaffold: 4 new module dirs + registry/Makefile wiring (stubs) leviathan 2026-05-16 22:17:47 -04:00
  • e2a3d6e94f release: v0.2.0 — --full-chain root-pop opt-in across 7 🟡 modules v0.2.0 leviathan 2026-05-16 22:06:14 -04:00
  • c1d1910a90 modules: wire --full-chain root-pop into all 7 🟡 PRIMITIVE modules leviathan 2026-05-16 22:04:40 -04:00
  • 125ce8a08b core: add shared finisher + offset resolver + --full-chain flag leviathan 2026-05-16 21:56:03 -04:00
  • 3a5105c84c README: clarify iamroot runs unprivileged + add non-root → root demo leviathan 2026-05-16 21:51:32 -04:00
  • a564571e88 ci: add libc6-dev-arm64-cross for aarch64 cross-build v0.1.0 leviathan 2026-05-16 21:42:22 -04:00
  • dce158e33a release: v0.1.0 — 20-module corpus, 13 root-pop + 7 primitive leviathan 2026-05-16 21:40:51 -04:00
  • 3015e71ea3 modules: port final 2 detect-only modules (xtcompat + stackrot) leviathan 2026-05-16 21:31:21 -04:00
  • 498bb36404 modules: port 5 detect-only modules to trigger+groom (Option B) leviathan 2026-05-16 21:22:17 -04:00
  • 4e9741ef1f Add overlayfs_setuid CVE-2023-0386 — FULL working exploit leviathan 2026-05-16 21:11:37 -04:00
  • 6eab6d3f70 Add cgroup_release_agent CVE-2022-0492 — FULL working exploit leviathan 2026-05-16 21:09:34 -04:00
  • 7387ffd3bd Add stackrot (CVE-2023-3269) + af_packet2 (CVE-2020-14386) modules leviathan 2026-05-16 21:03:36 -04:00
  • b24934156a Install ergonomics: GitHub release workflow + install.sh + README quickstart leviathan 2026-05-16 21:01:34 -04:00
  • 541aac6993 Phase 7: ptrace_traceme CVE-2019-13272 — port FULL jannh-style exploit leviathan 2026-05-16 20:57:44 -04:00
  • b6dd1e0482 Add --audit command: system-hygiene scan (setuid/world-writable/caps/sudo) leviathan 2026-05-16 20:52:36 -04:00
  • a52f5a657f Phase 7: af_packet (CVE-2017-7308) + FUSE legacy (CVE-2022-0185) leviathan 2026-05-16 20:49:58 -04:00
  • 102b117d4e Phase 7: PTRACE_TRACEME (CVE-2019-13272) + xt_compat (CVE-2021-22555) leviathan 2026-05-16 20:47:24 -04:00
  • e2fcc6a9e0 Phase 7: overlayfs CVE-2021-3493 — port FULL exploit (vsh-style) leviathan 2026-05-16 20:42:28 -04:00
  • cb39cc5119 Phase 7: Dirty COW (CVE-2016-5195) FULL module — old-systems coverage leviathan 2026-05-16 20:38:46 -04:00
  • 3ad1446489 Add cls_route4 CVE-2022-2588 module (detect-only) leviathan 2026-05-16 20:33:14 -04:00
  • fe33400f94 JSON polish: --list --json + --module-info + json_escape helper leviathan 2026-05-16 20:31:20 -04:00