« Best of Linux Privilege Escalation for OSCP Linux Privilege Escalation using Capabilities https://lnkd.in/fuj7vUD Lxd Privilege Escalation https://lnkd.in… »
arthastang/IoT-Implant-Toolkit
« IoT-Implant-Toolkit is a framework of useful tools for malware implantation research of IoT devices. It is a toolkit consisted of essential software tools on firmware modification, serial port debugging, software analysis and stable spy clients. »
Documenting the impossible: Unexploitable XSS labs
« Have you ever found some risky behavior, but couldn’t quite prove it was exploitable? Our XSS cheat sheet contains virtually every exploit technique we know of, but what should you do if you can’t find a technique for your scenario? Did we just forget to mention the right technique, or is it actuall »
checkra1n
« Q: What is checkra1n? A: checkra1n is a community project to provide a high-quality semi-tethered jailbreak to all, based on the ‘checkm8’ bootrom exploit. Q: How does it work? A: Magic hax. »
Reverse RDP – The Path Not Taken
« During 2019, we published our research on the Reverse RDP Attack: Part 1 and Part 2. In those blog posts, we described how we found numerous critical vulnerabilities in popular Remote Desktop Protocol (RDP) clients. »
RCE on Windows from Linux Part 3: Pass-The-Hash Toolkit
« In this article we will be detailing Pass-The-Hash (PTH) toolkit – a true pioneer in passing the hash attacks. This is the third part of the blog post series focused on tools for performing remote command execution (RCE) on Windows machines from Linux (Kali). »
Hacking Articles posted on LinkedIn
« Best of Linux Privilege Escalation for OSCP Linux Privilege Escalation using Capabilities https://lnkd.in/fuj7vUD Lxd Privilege Escalation https://lnkd.in… »
arthastang/IoT-Implant-Toolkit
« IoT-Implant-Toolkit is a framework of useful tools for malware implantation research of IoT devices. It is a toolkit consisted of essential software tools on firmware modification, serial port debugging, software analysis and stable spy clients. »
Documenting the impossible: Unexploitable XSS labs
« Have you ever found some risky behavior, but couldn’t quite prove it was exploitable? Our XSS cheat sheet contains virtually every exploit technique we know of, but what should you do if you can’t find a technique for your scenario? Did we just forget to mention the right technique, or is it actuall »




