#RCE
https://t.co/F9of890IQh
https://t.co/dTuAIHIk7t
https://t.co/LNe2A8xwOM
https://t.co/8BCSrzAo72
https://t.co/qPB62I7qNo
https://t.co/XdwFJjUCVX
https://t.co/j9Db6GVmp7
https://t.co/NdhxcUnIs6
https://t.co/Z364swmX8G
#bugbounty,#bugbountytips
https://t.co/F9of890IQh
https://t.co/dTuAIHIk7t
https://t.co/LNe2A8xwOM
https://t.co/8BCSrzAo72
https://t.co/qPB62I7qNo
https://t.co/XdwFJjUCVX
https://t.co/j9Db6GVmp7
https://t.co/NdhxcUnIs6
https://t.co/Z364swmX8G
#bugbounty,#bugbountytips
spaceraccoon.dev
A Tale of Two Formats: Exploiting Insecure XML and ZIP File Parsers to Create a Web Shell — spaceraccoon.dev
XML and ZIP - A Tale as Old As Time While researching a bug bounty target, I came across a web application that processed a custom file ...
An interesting way to use https://lolbas-project.github.io/lolbas/Libraries/Advpack/
a dropped INF, loading your local dll without it being shown in the rundll32.exe command line
then deleting the INF.
Demo:
https://pastebin.com/3De4bNQR
a dropped INF, loading your local dll without it being shown in the rundll32.exe command line
then deleting the INF.
Demo:
https://pastebin.com/3De4bNQR
Pastebin
@echo off echo [version]>>"%temp%\drp.inf" echo signature="$CHICAGO$">>"%temp% - Pastebin.com
Use "X-Forwarded-Host" for host header poisoning, sometimes it's work if only host header is not working.
#BugBounty
#BugBounty
#OSCP
xurls
https://github.com/mvdan/xurls
pentesting-cookbook
https://github.com/tasooshi/pentesting-cookbook
rapidscan
https://github.com/skavngr/rapidscan
JustTryHarder
https://github.com/sinfulz/JustTryHarder
awesome-privilege-escalation
https://github.com/m0nad/awesome-privilege-escalation
linux-smart-enumeration
https://github.com/diego-treitos/linux-smart-enumeration
#bugbounty
xurls
https://github.com/mvdan/xurls
pentesting-cookbook
https://github.com/tasooshi/pentesting-cookbook
rapidscan
https://github.com/skavngr/rapidscan
JustTryHarder
https://github.com/sinfulz/JustTryHarder
awesome-privilege-escalation
https://github.com/m0nad/awesome-privilege-escalation
linux-smart-enumeration
https://github.com/diego-treitos/linux-smart-enumeration
#bugbounty
GitHub
GitHub - mvdan/xurls: Extract urls from text
Extract urls from text. Contribute to mvdan/xurls development by creating an account on GitHub.