wget-root :
If the wget binary has the SUID bit set, It does not drop the elevated privileges and may be abused to access the file system. It may be used to do privileged writes or write files outside a restricted file system. This script automates the rewriting of the passwd file of the victim's machine.
https://github.com/CopernicusPY/wget-root
If the wget binary has the SUID bit set, It does not drop the elevated privileges and may be abused to access the file system. It may be used to do privileged writes or write files outside a restricted file system. This script automates the rewriting of the passwd file of the victim's machine.
https://github.com/CopernicusPY/wget-root
GitHub
GitHub - lil-skelly/wget-root: This is a python script that exploits wget when being set with a SUID bit, and overwrites the root…
This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password. - lil-skelly/wget-root
Apache Tomcat Vulnerability Scanner:
https://github.com/p0dalirius/ApacheTomcatScanner
https://github.com/p0dalirius/ApacheTomcatScanner
GitHub
GitHub - p0dalirius/ApacheTomcatScanner: A python script to scan for Apache Tomcat server vulnerabilities.
A python script to scan for Apache Tomcat server vulnerabilities. - GitHub - p0dalirius/ApacheTomcatScanner: A python script to scan for Apache Tomcat server vulnerabilities.
Powershell script that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines.
https://github.com/last-byte/PersistenceSniper/
https://github.com/last-byte/PersistenceSniper/
GitHub
GitHub - last-byte/PersistenceSniper: Powershell module that can be used by Blue Teams, Incident Responders and System Administrators…
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made w...
Certipy 4.0: ESC9 & ESC10, BloodHound GUI, New Authentication and Request Methods — and more!
https://research.ifcr.dk/certipy-4-0-esc9-esc10-bloodhound-gui-new-authentication-and-request-methods-and-more-7237d88061f7
https://github.com/ly4k/Certipy
https://research.ifcr.dk/certipy-4-0-esc9-esc10-bloodhound-gui-new-authentication-and-request-methods-and-more-7237d88061f7
https://github.com/ly4k/Certipy
Medium
Certipy 4.0: ESC9 & ESC10, BloodHound GUI, New Authentication and Request Methods — and more!
A new version of Certipy has been released along with a forked BloodHound GUI that has PKI support! In this blog post, we will look at…
This script allows to find MySQLi vulnerabilities Based on Errors with nuclei
https://github.com/HernanRodriguez1/ScanMySQLiErrorBased-Nuclei
https://github.com/HernanRodriguez1/ScanMySQLiErrorBased-Nuclei
GitHub
GitHub - HernanRodriguez1/ScanMySQLiErrorBased-Nuclei
Contribute to HernanRodriguez1/ScanMySQLiErrorBased-Nuclei development by creating an account on GitHub.
PersistAssist is a fully modular persistence framework written in C#. All persistence techniques contain a cleanup method which will server to remove the persistence aside from the persistence code. This is a WIP so there are many empty classes, the main object of this project initially was to build out a fully modular framework meant to make adding new features as simple as inheriting a class and adding the code.
https://github.com/FortyNorthSecurity/PersistAssist
https://github.com/FortyNorthSecurity/PersistAssist
GitHub
GitHub - RedSiege/PersistAssist: Fully modular persistence framework
Fully modular persistence framework. Contribute to RedSiege/PersistAssist development by creating an account on GitHub.
A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997
for mitigation Update to Webmin >= 1.997
https://github.com/p0dalirius/CVE-2022-36446-Webmin-Software-Package-Updates-RCE
#webmin #rce
for mitigation Update to Webmin >= 1.997
https://github.com/p0dalirius/CVE-2022-36446-Webmin-Software-Package-Updates-RCE
#webmin #rce
GitHub
GitHub - p0dalirius/CVE-2022-36446-Webmin-Software-Package-Updates-RCE: A Python script to exploit CVE-2022-36446 Software Package…
A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997. - p0dalirius/CVE-2022-36446-Webmin-Software-Package-Updates-RCE
An automatic unpacker and logger for DotNet Framework targeting files! This tool has been unveiled at Black Hat USA 2022.
https://github.com/advanced-threat-research/DotDumper
#unpacker #DotNet
https://github.com/advanced-threat-research/DotDumper
#unpacker #DotNet
GitHub
GitHub - advanced-threat-research/DotDumper: An automatic unpacker and logger for DotNet Framework targeting files
An automatic unpacker and logger for DotNet Framework targeting files - advanced-threat-research/DotDumper
This repository contains de materials for the talk "Exploring the hidden attack surface of OEM IoT devices: pwning thousands of routers with a vulnerability in Realtek’s SDK for eCos OS.", which was presented at DEFCON30.
https://github.com/infobyte/cve-2022-27255
#Realtek #eCos
https://github.com/infobyte/cve-2022-27255
#Realtek #eCos
GitHub
GitHub - infobyte/cve-2022-27255
Contribute to infobyte/cve-2022-27255 development by creating an account on GitHub.
Sandman is a NTP based backdoor for red team engagements in hardened networks.
https://github.com/Idov31/Sandman
#NTP #backdoor
https://github.com/Idov31/Sandman
#NTP #backdoor
GitHub
GitHub - Idov31/Sandman: Sandman is a NTP based backdoor for hardened networks.
Sandman is a NTP based backdoor for hardened networks. - Idov31/Sandman
TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
https://github.com/hktalent/TOP
#bugbounty
https://github.com/hktalent/TOP
#bugbounty
GitHub
GitHub - GhostTroops/TOP: TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things - GhostTroops/TOP
Security researchers discovered 3 vulnerabilities in the Linux kernel that could allow a local attacker to elevate privileges and potentially execute malicious code. The proof-of-concept code is publicly available increasing the likelihood of exploitation in the wild.
https://github.com/greek0x0/2022-LPE-UAF
https://zplin.me/papers/DirtyCred-Zhenpeng.pdf
#LPE
https://github.com/greek0x0/2022-LPE-UAF
https://zplin.me/papers/DirtyCred-Zhenpeng.pdf
#LPE
GitHub
GitHub - greek0x0/2022-LPE-UAF: PoC of various bugs in the Linux kernel
PoC of various bugs in the Linux kernel. Contribute to greek0x0/2022-LPE-UAF development by creating an account on GitHub.