mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2025-01-30 15:15:04 +00:00
Typo fix
This commit is contained in:
parent
e36b15a6d7
commit
450de2c90f
@ -12,7 +12,7 @@
|
||||
* [EoP - Windows Subsystem for Linux (WSL)](#eop---windows-subsystem-for-linux-wsl)
|
||||
* [EoP - Unquoted Service Paths](#eop---unquoted-service-paths)
|
||||
* [EoP - Kernel Exploitation](#eop---kernel-exploitation)
|
||||
* [EOP - AlwaysInstallElevated](#eop---alwaysinstallelevated)
|
||||
* [EoP - AlwaysInstallElevated](#eop---alwaysinstallelevated)
|
||||
* [EoP - Insecure GUI apps](#eop---insecure-gui-apps)
|
||||
* [EoP - Runas](#eop---runas)
|
||||
|
||||
@ -499,7 +499,7 @@ List of exploits kernel : [https://github.com/SecWiki/windows-kernel-exploits](h
|
||||
...
|
||||
- [MS03-026](./MS03-026) [KB823980] [Buffer Overrun In RPC Interface] (/NT/2000/XP/2003)
|
||||
|
||||
## EOP - AlwaysInstallElevated
|
||||
## EoP - AlwaysInstallElevated
|
||||
|
||||
Check if these registry values are set to "1".
|
||||
|
||||
|
@ -96,6 +96,7 @@ Bypass localhost with a domain redirecting to locahost
|
||||
http://localtest.me
|
||||
http://customer1.app.localhost.my.company.127.0.0.1.nip.io
|
||||
http://mail.ebc.apple.com redirect to 127.0.0.6 == localhost
|
||||
http://bugbounty.dod.network redirect to 127.0.0.2 == localhost
|
||||
```
|
||||
|
||||
The service nip.io is awesome for that, it will convert any ip address as a dns.
|
||||
|
@ -11,7 +11,7 @@ Cross-site scripting (XSS) is a type of computer security vulnerability typicall
|
||||
- [Polyglot XSS](#polyglot-xss)
|
||||
- [Filter Bypass and Exotic payloads](#filter-bypass-and-exotic-payloads)
|
||||
- [CSP Bypass](#csp-bypass)
|
||||
- [Common WAF Bypas](#common-waf-bypass)
|
||||
- [Common WAF Bypass](#common-waf-bypass)
|
||||
|
||||
## Exploit code or POC
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user