Commit Graph

  • ea5d021f0c tools/iamroot-fleet-scan.sh + docs/DETECTION_PLAYBOOK.md leviathan 2026-05-16 20:29:48 -04:00
  • 3eeee01f06 Phase 7: overlayfs CVE-2021-3493 module (Ubuntu userns LPE) — detect-only leviathan 2026-05-16 20:22:32 -04:00
  • b206610a8e entrybleed: active probe (--active runs reduced sweep + sanity-checks kbase) leviathan 2026-05-16 20:20:41 -04:00
  • a4b7238e4a Phase 7: nf_tables CVE-2024-1086 + active probe for dirty_pipe leviathan 2026-05-16 20:19:11 -04:00
  • f1bd896ca8 Phase 7: Pwnkit FULL exploit (Qualys-style PoC) + DEFENDERS.md leviathan 2026-05-16 20:13:11 -04:00
  • 43e290b224 Phase 7: Pwnkit (CVE-2021-4034) detect-only module leviathan 2026-05-16 20:07:40 -04:00
  • 28ad566964 Phase 6 (partial): --mitigate bridged for copy_fail_family leviathan 2026-05-16 20:04:32 -04:00
  • 4943b82129 Phase 4 (partial): GitHub Actions build-check CI leviathan 2026-05-16 20:02:53 -04:00
  • 5a0aef12d0 Phase 2 complete: Dirty Pipe full exploit (page-cache UID flip → su) leviathan 2026-05-16 20:02:02 -04:00
  • cee368d5a4 Phase 5: --detect-rules export with dedup leviathan 2026-05-16 19:58:26 -04:00
  • f03efbff13 Phase 3: EntryBleed module — working stage-1 kbase leak brick leviathan 2026-05-16 19:55:22 -04:00
  • 1552a3bfcb Phase 2 (partial): Dirty Pipe DETECT-ONLY module + core/kernel_range leviathan 2026-05-16 19:51:47 -04:00
  • 19b9162b1d ROADMAP: mark Phase 1 done; CVES: use new short module names leviathan 2026-05-16 19:32:52 -04:00
  • 52e8c99022 Phase 1: module interface + registry + top-level dispatcher leviathan 2026-05-16 19:32:11 -04:00
  • cf30b249de Initial skeleton: README, CVE inventory, roadmap, ARCH, ethics + copy_fail_family module absorbed from DIRTYFAIL leviathan 2026-05-16 19:26:24 -04:00