Windows oneliners to download remote payload and execute arbitrary code
https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/
https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/
arno0x0x
Windows oneliners to download remote payload and execute arbitrary code
In the wake of the recent buzz and trend in using DDE for executing arbitrary command lines and eventually compromising a system, I asked myself « what are the coolest command lines an a…
Packet capture on Windows without drivers
https://www.nospaceships.com/2018/09/19/packet-capture-on-windows-without-drivers.html
https://www.nospaceships.com/2018/09/19/packet-capture-on-windows-without-drivers.html
NoSpaceships Ltd
Packet capture on Windows without drivers
Introduction
exploitation notes for CVE-2018-17456 (.gitmodules RCE)
CVE-2018-17456
https://gist.github.com/joernchen/38dd6400199a542bc9660ea563dcf2b6
CVE-2018-17456
https://gist.github.com/joernchen/38dd6400199a542bc9660ea563dcf2b6
Gist
CVE-2018-17456
CVE-2018-17456. GitHub Gist: instantly share code, notes, and snippets.
Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32
https://bohops.com/2018/06/28/abusing-com-registry-structure-clsid-localserver32-inprocserver32/
https://bohops.com/2018/06/28/abusing-com-registry-structure-clsid-localserver32-inprocserver32/
Abusing the COM Registry Structure (Part 2): Hijacking & Loading Techniques
https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/
https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/
Useful resources for #iOS #pentesting / pwning http://file.allitebooks.com/20170130/iOS%20Penetration%20Testing.pdf