CVE-2019-8372: Local Privilege Elevation in LG Kernel Driver - @Jackson_T
http://www.jackson-t.ca/lg-driver-lpe.html
http://www.jackson-t.ca/lg-driver-lpe.html
GitHub - Tuhinshubhra/CMSeeK: CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and 150 other CMSs
https://github.com/Tuhinshubhra/CMSeeK
https://github.com/Tuhinshubhra/CMSeeK
GitHub
GitHub - Tuhinshubhra/CMSeeK: CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs
CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs - Tuhinshubhra/CMSeeK
GitHub - AntonioErdeljac/Google-Machine-Learning-Course-Notes: Notes taken from Google Machine Learning Course provided to public for practice & correction.
https://github.com/AntonioErdeljac/Google-Machine-Learning-Course-Notes
https://github.com/AntonioErdeljac/Google-Machine-Learning-Course-Notes
GitHub
AntonioErdeljac/Google-Machine-Learning-Course-Notes
Notes taken from Google Machine Learning Course provided to public for practice & correction. - AntonioErdeljac/Google-Machine-Learning-Course-Notes
Why you should not use GraphQL schema generators – Raz0r.name
https://raz0r.name/articles/why-you-should-not-use-graphql-schema-generators/
https://raz0r.name/articles/why-you-should-not-use-graphql-schema-generators/
WordPress 5.0.0 Remote Code Execution – A combination of a Path Traversal and Local File Inclusion vulnerability lead to RCE Remote Code Execution in the WordPress core. The vulnerability was present for over 6 years. Check out how we found it! https://t.co/H8uZceNTel
Microsoft Edge RCE - (CVE-2018-8495) - Abdulrahman Al-Qabandi
https://leucosite.com/Microsoft-Edge-RCE/
https://leucosite.com/Microsoft-Edge-RCE/
Leucosite
Edge RCE
(CVE-2018-8495) Chaining small bugs together to achieve RCE
MikroTik Firewall & NAT Bypass – Tenable TechBlog – Medium
https://medium.com/tenable-techblog/mikrotik-firewall-nat-bypass-b8d46398bf24
https://medium.com/tenable-techblog/mikrotik-firewall-nat-bypass-b8d46398bf24
Medium
MikroTik Firewall & NAT Bypass
Exploitation from WAN to LAN
GitHub - parsiya/Hacking-with-Go: Golang for Security Professionals
https://github.com/parsiya/Hacking-with-Go
https://github.com/parsiya/Hacking-with-Go
GitHub
GitHub - parsiya/Hacking-with-Go: Golang for Security Professionals
Golang for Security Professionals. Contribute to parsiya/Hacking-with-Go development by creating an account on GitHub.
Abusing autoresponders and email bounces – intigriti – Medium
https://medium.com/intigriti/abusing-autoresponders-and-email-bounces-9b1995eb53c2
https://medium.com/intigriti/abusing-autoresponders-and-email-bounces-9b1995eb53c2
Medium
Abusing autoresponders and email bounces
Being a bug bounty hunter, I face a lot of competition. Lots of companies are willing to issue rewards for vulnerabilities in their…
How to find open databases with the help of Shodan and Lampyre
https://medium.com/@lampyre.io/how-to-find-open-databases-with-the-help-of-shodan-and-lampyre-1d6499003fb
https://medium.com/@lampyre.io/how-to-find-open-databases-with-the-help-of-shodan-and-lampyre-1d6499003fb
Medium
How to find open databases with the help of Shodan and Lampyre
Today I’ll be telling you about the tool which combines the advantages of many tools for Cyber Threat Intelligence and Open Source…
## OSINT
## searchengines
## hunt
censys.io
shodan.io
viz.greynoise.io/table
zoomeye.org
fofa.so
onyphe.io
app.binaryedge.io
hunter.io
wigle.net
Lampire.io
## searchengines
## hunt
censys.io
shodan.io
viz.greynoise.io/table
zoomeye.org
fofa.so
onyphe.io
app.binaryedge.io
hunter.io
wigle.net
Lampire.io
Pwning with Responder - A Pentester's Guide - NotSoSecure
https://www.notsosecure.com/pwning-with-responder-a-pentesters-guide/
https://www.notsosecure.com/pwning-with-responder-a-pentesters-guide/
NotSoSecure
Pwning with Responder - A Pentester's Guide
Overview: Responder is a great tool that every pentester needs in their arsenal. If a client/target cannot resolve a name via DNS it will fall back to name resolution via LLMNR (introduced in Windows
💀 Exploit Drupal < 8.6.10 / < 8.5.11 - REST Module Remote Code Execution CVE-2019-6340
https://sploitus.com/exploit?id=EDB-ID:46452
https://sploitus.com/exploit?id=EDB-ID:46452
Sploitus
💀 Exploit for Drupal < 8.6.10 / < 8.5.11 - REST Module Remote Code Execution
Exploit for Drupal < 8.6.10 / < 8.5.11 - REST Module Remote Code Execution | Sploitus | Exploit & Hacktool Search Engine
How-To: Cloud Cracker
1) Create AWS EC2 Instance
2) Choose p3.16xlarge
3) Install nVidia drivers
4) Install Hashcat
5) Crack Password Hashes
Alt) Choose an upToDate AMI from nVidia in the AWS Marketplace that already has nvidia drivers & configs installed. Then install Hashcat.
1) Create AWS EC2 Instance
2) Choose p3.16xlarge
3) Install nVidia drivers
4) Install Hashcat
5) Crack Password Hashes
Alt) Choose an upToDate AMI from nVidia in the AWS Marketplace that already has nvidia drivers & configs installed. Then install Hashcat.
GitHub - 0xInfection/Awesome-WAF: 🔥 A curated list of awesome web-app firewall (WAF) stuff.
https://github.com/0xInfection/Awesome-WAF
https://github.com/0xInfection/Awesome-WAF
GitHub
GitHub - 0xInfection/Awesome-WAF: Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥
Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥 - 0xInfection/Awesome-WAF
Need to steal the password to a wireless network? Have access to Windows 8 or 10 box?
1) netsh wlan show profiles
2) netsh wlan show profile name=WIFI_NAME key=clear
3) Look for the “Key Content” line, the cleartext password will be there.
1) netsh wlan show profiles
2) netsh wlan show profile name=WIFI_NAME key=clear
3) Look for the “Key Content” line, the cleartext password will be there.