<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Exploit on Red Team Guide</title><link>https://redteamguide.com/tags/exploit/</link><description>Recent content in Exploit on Red Team Guide</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Thu, 30 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://redteamguide.com/tags/exploit/index.xml" rel="self" type="application/rss+xml"/><item><title>Linux Kernel "Copy Fail" Zero-Day (CVE-2026-31431): Root on Every Major Distro Since 2017</title><link>https://redteamguide.com/threat-intel/copy-fail-linux-kernel-cve-2026-31431/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><guid>https://redteamguide.com/threat-intel/copy-fail-linux-kernel-cve-2026-31431/</guid><description>CVE-2026-31431 &amp;#39;Copy Fail&amp;#39;: a kernel crypto bug turns any readable setuid binary into a root shell. 732-byte Python exploit, 100% reliable, works on every distro since kernel 4.14.</description></item></channel></rss>