-
If you like my
#GTFOBLookup tool for querying#gtfobins and#LOLBAS offline, please consider giving it a star on GitHub (https://github.com/nccgroup/GTFOBLookup …)#infosec#pentesting#redteam#privesc#python -
[CVE-2016-1247 Update]
#Nginx - Root#PrivEsc -#Gentoo#Linux also affected -#exploit#infosec#itsecurity#0day https://legalhackers.com/advisories/Nginx-Exploit-Deb-Root-PrivEsc-CVE-2016-1247.html … -
BeRoot - Windows Privilege Escalation Tool Author:
@Aless_Zanni#Windows#PrivEsc https://github.com/AlessandroZ/BeRoot … -
burplay -
#BurpSuite Extension to aid in searching for Privilege Escalation issues By@SpiderLabs#PrivEsc https://github.com/SpiderLabs/burplay … -
Vulnerability disclosure:
#CVE-2017-7344 Get SYSTEM privileges from the Windows logon screen by abusing the@Fortinet VPN client:#FortiClient (privilege escalation#privesc)
https://securite.intrinsec.com/2017/12/22/cve-2017-7344-fortinet-forticlient-windows-privilege-escalation-at-logon/ … (#exploit steps included
) -
-
-
Sherlock -
#PowerShell script to find missing software patches for#PrivEsc#vulnerabilities Author:@_RastaMousehttps://github.com/rasta-mouse/Sherlock … -
[VIDEO PoC]
#Nagios#RCE CVE-2016-9565 & Root#PrivEsc CVE-2016-9566#vuln#exploit#itsecurity Watch at: https://legalhackers.com/videos/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.html …#securitypic.twitter.com/Yi9oFmCxfQ
-
Last year
@SpenGietz wrote about 21 methods that could lead to#AWS#privesc. Gerben Kleijn discovered that those 21 methods could be grouped into 5 categories. Learn more about his findings & how to securely set up user permissions. https://hubs.ly/H0ml8540 pic.twitter.com/s3WodDFlur
-
Rumble in the pipe - a nice writeup about a
#privesc vuln in#tinywall by our teammate@frycoshttps://codewhitesec.blogspot.com/2020/01/cve-2019-19470-rumble-in-pipe.html … -
#Privesc & Post exploitation docs for redteamers ;) https://rmusser.net/docs/Privilege%20Escalation%20&%20Post-Exploitation.html … just awesome!#redteam#Pentesting -
A really useful guide to Windows Privilege Escalation the manual way! I can think of a couple technical certs this could be useful for.
#infosec#privesc#redteam#pentesthttps://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/ … -
Interesting combination of tools for Pentesting: Active Directory Assessment and Privilege Escalation Script http://ow.ly/aulV30k5G7d
#PowerShell#Security#Pentesting#AD#PrivEsc -
I've been waiting for someone to notice more GPU security weaknesses: https://www.codeaurora.org/projects/security-advisories/unprivileged-gpu-command-streams-can-change-iommu-page-table-cve-2014 … waiting for a working VM escape &
#PrivEsc -
Local privesc exloit for CVE-2015-6565 which affects OpenSSH 6.8-6.9 http://www.openwall.com/lists/oss-security/2017/01/26/2 … by
@uid1000#privesc#exploit -
RID Hijacking on Windows https://csl.com.co/rid-hijacking/
#privesc#Windows -
While I'm picking on
#GPU security, this one is very cute: https://github.com/robclark/kilroy a#PrivEsc in snapdragon devices -
Since
@steam_games fixed the#privesc vulnerability in the recent Steam Client, here's the exploit. For research purposes only, please don't break stuff without permission: https://github.com/alexanderbittner/steam-privesc/ … -
0day alert: Symantec Endpoint Protection Mansger, Escalation of Privilege: https://github.com/DimopoulosElias/SEPM-EoP …
#0day#exploit#privesc#disclosure#infosec#cybersecurity#redteam#pentest
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.