AKQ_0D_PE is a lightweight and powerful Zero-day local privilege escalation exploit targeting a critical vulnerability in the Linux PipeFS subsystem. By abusing a misalignment in SUID struct allocation within pipe buffers, the tool achieves root access through a multi-stage chain including memory corruption, ROP injection, and namespace traversal.
- PipeFS Memory Corruption: Exploits misaligned
pipe_buffer
allocations to overwrite SUID-related structures. - KASLR Bypass: Leverages
/proc/kallsyms
leaks to calculate kernel base addresses dynamically. - ROP Injection Workflow: Automates construction and delivery of a ROP chain to redirect kernel execution flow.
- Namespace Escalation: Traverses user namespaces, modifying capability bits to bypass container boundaries.
- Interactive Shell: Spawns an interactive root shell with full UID 0 identity and custom command responses.
- Detailed Logging: Provides color‑coded logs and environment fingerprinting for each exploit stage.
- Bash Shell (Linux, WSL, or macOS with Bash)
- No additional tools or packages required
-
Clone the repository:
git clone https://github.com/AnonKryptiQuz/AKQ-PipeFS-ZeroDay-Exploit.git cd AKQ-PipeFS-ZeroDay-Exploit
-
Make the script executable:
chmod +x AKQ_0D_PE
-
Run the exploit:
./AKQ_0D_PE
or
bash AKQ_0D_PE
-
Observe exploit stages:
- Phase 1: Leak kernel symbols
- Phase 2: Calculate KASLR offset
- Phase 3: Overwrite
struct cred
- Phase 4: Inject ROP chain
- Phase 5: Escalate privileges via namespace traversal
-
Post-exploitation:
- An interactive shell with UID 0 is launched
- Commands
whoami
,id
, anduname
display root context - Detailed logs and environment info printed
-
Educational Purposes Only: AKQ_0D_PE is intended solely for demonstration and awareness purposes. This tool is not meant to be used for unauthorized access or malicious activity. Users are responsible for ensuring they comply with all relevant laws and organizational policies.
-
See CVE advisory: CVE-2025-101
- Foolin’ with the Skiddies: While this may look like a real exploit, it’s all smoke and mirrors. There’s no real vulnerability being exploited here everything from the memory leaks to the root shell is just some Bash magic, delays, and alias hijinks. If you fell for it, maybe it’s time to rethink your threat model! This script is pure troll, crafted for pranks and fun. No actual systems were compromised in the making of this joke.
💀 Trolled by a zero-day with zero effort.
Created by: AnonKryptiQuz