Extracting SSH Private Keys from Windows 10 ssh-agent
https://blog.ropnop.com/extracting-ssh-private-keys-from-windows-10-ssh-agent/
https://blog.ropnop.com/extracting-ssh-private-keys-from-windows-10-ssh-agent/
ropnop blog
Extracting SSH Private Keys From Windows 10 ssh-agent
The newest Windows 10 update includes OpenSSH utilities, including ssh-agent. Here’s how to extract unencrypted saved private keys from the registry
EL3 Tour: Get the Ultimate Privilege of Android Phone
https://speakerdeck.com/hhj4ck/el3-tour-get-the-ultimate-privilege-of-android-phone
https://speakerdeck.com/hhj4ck/el3-tour-get-the-ultimate-privilege-of-android-phone
Speaker Deck
EL3 Tour: Get the Ultimate Privilege of Android Phone
Slides for INFILTRATE 2019
How i was able to hack into databases of my university
https://medium.com/@fouadsarmi/how-i-was-able-to-hack-into-databases-of-my-university-669d6442a943
https://medium.com/@fouadsarmi/how-i-was-able-to-hack-into-databases-of-my-university-669d6442a943
Medium
How i was able to hack into databases of my university
hello guys , after graduate from the high school i was interesting about hacking and penetration testing , so my full mind was surrounded…
10 years of virtual dynamite: A high-level retrospective of ATM malware
https://blog.talosintelligence.com/2019/05/10-years-of-virtual-dynamite.html
https://blog.talosintelligence.com/2019/05/10-years-of-virtual-dynamite.html
Cisco Talos Blog
10 years of virtual dynamite: A high-level retrospective of ATM malware
ATM malware has evolved to include a number of different families and different actors behind them, ranging from criminal groups to actors affiliated with nation states.
Сookie-based XSS exploitation | $2300 Bug Bounty story
https://medium.com/@iSecMax/%D1%81ookie-based-xss-exploitation-2300-bug-bounty-story-9bc532ffa564
https://medium.com/@iSecMax/%D1%81ookie-based-xss-exploitation-2300-bug-bounty-story-9bc532ffa564
Medium
Сookie-based XSS exploitation | $2300 Bug Bounty story
For quite a long time I have been hunting for vulnerabilities on the HackerOne platform, allocating a certain amount of time outside the…
Multiple vulnerabilities in Oracle Business Intelligence, admin session bypass trick
https://github.com/vah13/Oracle-BI-bugs#cve-2019-2768
https://github.com/vah13/Oracle-BI-bugs#cve-2019-2768
GitHub
GitHub - vah13/Oracle-BI-bugs
Contribute to vah13/Oracle-BI-bugs development by creating an account on GitHub.
Payload to create a new user with Admin role exploiting Jenkins Metaprogramming RCE
https://gist.github.com/akhil-reni/e2116cc243af096ca3416168f49b3298
https://gist.github.com/akhil-reni/e2116cc243af096ca3416168f49b3298
Gist
Jenkins Metaprogramming RCE Create new user
Jenkins Metaprogramming RCE Create new user . GitHub Gist: instantly share code, notes, and snippets.