mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2025-01-30 23:25:03 +00:00
Typo fix
This commit is contained in:
parent
e36b15a6d7
commit
450de2c90f
@ -12,7 +12,7 @@
|
|||||||
* [EoP - Windows Subsystem for Linux (WSL)](#eop---windows-subsystem-for-linux-wsl)
|
* [EoP - Windows Subsystem for Linux (WSL)](#eop---windows-subsystem-for-linux-wsl)
|
||||||
* [EoP - Unquoted Service Paths](#eop---unquoted-service-paths)
|
* [EoP - Unquoted Service Paths](#eop---unquoted-service-paths)
|
||||||
* [EoP - Kernel Exploitation](#eop---kernel-exploitation)
|
* [EoP - Kernel Exploitation](#eop---kernel-exploitation)
|
||||||
* [EOP - AlwaysInstallElevated](#eop---alwaysinstallelevated)
|
* [EoP - AlwaysInstallElevated](#eop---alwaysinstallelevated)
|
||||||
* [EoP - Insecure GUI apps](#eop---insecure-gui-apps)
|
* [EoP - Insecure GUI apps](#eop---insecure-gui-apps)
|
||||||
* [EoP - Runas](#eop---runas)
|
* [EoP - Runas](#eop---runas)
|
||||||
|
|
||||||
@ -499,7 +499,7 @@ List of exploits kernel : [https://github.com/SecWiki/windows-kernel-exploits](h
|
|||||||
...
|
...
|
||||||
- [MS03-026](./MS03-026) [KB823980] [Buffer Overrun In RPC Interface] (/NT/2000/XP/2003)
|
- [MS03-026](./MS03-026) [KB823980] [Buffer Overrun In RPC Interface] (/NT/2000/XP/2003)
|
||||||
|
|
||||||
## EOP - AlwaysInstallElevated
|
## EoP - AlwaysInstallElevated
|
||||||
|
|
||||||
Check if these registry values are set to "1".
|
Check if these registry values are set to "1".
|
||||||
|
|
||||||
|
@ -96,6 +96,7 @@ Bypass localhost with a domain redirecting to locahost
|
|||||||
http://localtest.me
|
http://localtest.me
|
||||||
http://customer1.app.localhost.my.company.127.0.0.1.nip.io
|
http://customer1.app.localhost.my.company.127.0.0.1.nip.io
|
||||||
http://mail.ebc.apple.com redirect to 127.0.0.6 == localhost
|
http://mail.ebc.apple.com redirect to 127.0.0.6 == localhost
|
||||||
|
http://bugbounty.dod.network redirect to 127.0.0.2 == localhost
|
||||||
```
|
```
|
||||||
|
|
||||||
The service nip.io is awesome for that, it will convert any ip address as a dns.
|
The service nip.io is awesome for that, it will convert any ip address as a dns.
|
||||||
|
@ -11,7 +11,7 @@ Cross-site scripting (XSS) is a type of computer security vulnerability typicall
|
|||||||
- [Polyglot XSS](#polyglot-xss)
|
- [Polyglot XSS](#polyglot-xss)
|
||||||
- [Filter Bypass and Exotic payloads](#filter-bypass-and-exotic-payloads)
|
- [Filter Bypass and Exotic payloads](#filter-bypass-and-exotic-payloads)
|
||||||
- [CSP Bypass](#csp-bypass)
|
- [CSP Bypass](#csp-bypass)
|
||||||
- [Common WAF Bypas](#common-waf-bypass)
|
- [Common WAF Bypass](#common-waf-bypass)
|
||||||
|
|
||||||
## Exploit code or POC
|
## Exploit code or POC
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user