Swissky
|
7f0650dfc0
|
IIS Raid Persistence
|
2020-02-20 16:51:22 +01:00 |
|
Swissky
|
73aa26ba68
|
Merge pull request #158 from 0xdf0xdf/master
Adding second method of chaining PHP filters
|
2020-02-20 13:07:39 +01:00 |
|
0xdf
|
9d06e1297f
|
added additional way to chain php filters
|
2020-02-20 06:40:30 -05:00 |
|
0xdf
|
7d650e9622
|
fixed error in chaining php filters in File Inclusion page, added an additional example
|
2020-02-20 06:30:28 -05:00 |
|
Swissky
|
c2292145c8
|
Merge pull request #157 from Stoo0rmq/patch-1
Update File Inclusion
|
2020-02-18 12:38:43 +01:00 |
|
Borja
|
7be86354b2
|
Update File Inclusion
Added another path
|
2020-02-18 11:35:22 +00:00 |
|
Swissky
|
ba30618a8b
|
Cobalt Strike - Artifact
|
2020-02-14 17:10:00 +01:00 |
|
Swissky
|
7cd49769be
|
WMI + Cobalt Strike
|
2020-02-13 22:53:45 +01:00 |
|
Swissky
|
b76a23c77f
|
Merge pull request #156 from bhattsameer/patch-1
Added more TTY Shell using perl and python
|
2020-02-09 12:15:00 +01:00 |
|
Sameer Bhatt (debugger)
|
994e557178
|
Added more TTY Shell using perl and python
|
2020-02-09 12:46:18 +05:30 |
|
Swissky
|
aba6874517
|
Maps API + secretsdump enabled user/pw last set + certutil mimikatz
|
2020-02-06 21:41:29 +01:00 |
|
Swissky
|
9c4578f083
|
Merge pull request #155 from socketz/master
Updated Java & Groovy Shells
|
2020-02-06 16:42:35 +01:00 |
|
socketz
|
056161fd9f
|
Updated Java & Groovy Shells
Added threaded shells and alternative pure Java reverse shell
|
2020-02-06 15:43:58 +01:00 |
|
Swissky
|
37cfa0826e
|
Merge pull request #154 from antonioCoco/patch-1
Added fully interactive reverse shell for windows
|
2020-02-06 00:36:25 +01:00 |
|
antonioCoco
|
50a376337d
|
Update Reverse Shell Cheatsheet.md
|
2020-02-05 23:29:43 +01:00 |
|
Swissky
|
fb76fdc331
|
Windows Firewall + DLL hijacking + Named pipes
|
2020-02-01 22:12:36 +01:00 |
|
Swissky
|
8a19532f27
|
Merge pull request #152 from mcgyver5/master
Add Exploit for Telerik CVE-2017-9428
|
2020-01-29 00:06:57 +01:00 |
|
mcgyver5
|
667ae82aff
|
fixing typo in file name
|
2020-01-28 17:41:01 +00:00 |
|
mcgyver5
|
bef710fccd
|
add Telerik CVE attacks Telerik UI for ASP.NET ajax dialog handler
|
2020-01-28 17:33:30 +00:00 |
|
Tim
|
7d41cd750d
|
Merge pull request #1 from swisskyrepo/master
Merge pull request #151 from mcgyver5/master
|
2020-01-28 12:26:20 -05:00 |
|
Swissky
|
3840683bed
|
Merge pull request #151 from mcgyver5/master
add Telerik CVE-2019-18935
|
2020-01-27 20:13:28 +01:00 |
|
mcgyver5
|
44c68ca4e9
|
add Telerik CVE-2019-18935
|
2020-01-27 15:57:10 +00:00 |
|
Swissky
|
323a012488
|
Race Condition - First Draft
|
2020-01-26 12:43:59 +01:00 |
|
Swissky
|
eefa2afab1
|
Merge pull request #150 from austinsonger/master
Added CVE
|
2020-01-23 10:10:23 +01:00 |
|
Austin Songer
|
aacd095452
|
Added link to exploit creator
|
2020-01-22 17:49:47 +00:00 |
|
Austin Songer
|
b6e7ad655f
|
Add Technology Affected
|
2020-01-22 17:49:03 +00:00 |
|
Austin Songer
|
d54fa1ef26
|
ADDED CVE: CVE-2019-19781
|
2020-01-22 17:47:38 +00:00 |
|
Swissky
|
be0397fa68
|
BloodHound ZIP + Zero Width space tip
|
2020-01-19 22:46:45 +01:00 |
|
Swissky
|
590b7681e4
|
Merge pull request #146 from mzfr/patch-1
Update TTY shell command for python
|
2020-01-17 17:11:46 +01:00 |
|
Swissky
|
7920b4a124
|
Merge pull request #149 from ksg97031/patch-1
Add escaped double or single quote cases
|
2020-01-17 10:36:34 +01:00 |
|
ksg
|
aabb48125f
|
Add escaped double or single quote cases
|
2020-01-17 10:41:12 +09:00 |
|
Swissky
|
cfcf955a33
|
Merge pull request #148 from clirimemini/patch-1
Create 0xcela_event_handlers.txt
|
2020-01-15 18:13:41 +01:00 |
|
Çlirim Emini
|
d3ce3924a9
|
Create 0xcela_event_handlers.txt
|
2020-01-15 17:00:26 +01:00 |
|
Mehtab Zafar
|
8dc1e3c5fe
|
Update TTY shell command for python
Made the command to use python3 because mostly now the machines have python3 installed.
|
2020-01-10 17:57:53 +05:30 |
|
Swissky
|
7ab6750655
|
Merge pull request #145 from ayomawdb/master
Change IP and port to a common value across commands
|
2020-01-09 12:44:19 +01:00 |
|
Ayoma Wijethunga
|
7f34c01794
|
Change IP and port to a common value across commands
|
2020-01-09 16:20:49 +05:30 |
|
Ayoma Wijethunga
|
96b9adb98b
|
Change IP and port to a common value across commands
|
2020-01-09 16:17:35 +05:30 |
|
Swissky
|
742c7ee3c2
|
AppLocker rules
|
2020-01-06 23:03:54 +01:00 |
|
Swissky
|
71171fa78b
|
SSRF exploiting WSGI
|
2020-01-05 22:11:28 +01:00 |
|
Swissky
|
3a9b9529cb
|
Mimikatz - Credential Manager & DPAPI
|
2020-01-05 17:27:02 +01:00 |
|
Swissky
|
73abdeed71
|
Kerberos AD GPO
|
2020-01-05 16:28:00 +01:00 |
|
Swissky
|
b052f78d95
|
Blacklist3r and Machine Key
|
2020-01-02 23:33:04 +01:00 |
|
Swissky
|
97015e4f64
|
Merge pull request #143 from gdemarcsek/patch-1
Added another PHP reverse shell payload
|
2020-01-02 22:37:45 +01:00 |
|
György Demarcsek
|
9c188139ec
|
Added PHP reverse shell
This reverse shell payload for PHP works even if `exec` is disabled and/or the new socket is not on fd 3
|
2020-01-02 19:27:35 +01:00 |
|
Swissky
|
0850839b25
|
Merge pull request #142 from mikesiegel/mike_ssrf
Added anti-SSRF header bypass for GCP
|
2020-01-01 12:44:41 +01:00 |
|
mikesiegel
|
e024afc9f7
|
Added anti-SSRF header bypass for GCP.
|
2019-12-31 15:11:58 +00:00 |
|
mikesiegel
|
7aa2761e3e
|
Added anti-SSRF header bypass for GCP. Similar technique works on Azure and AWS I'm guessing.
|
2019-12-31 15:07:20 +00:00 |
|
Swissky
|
0a6ac284c9
|
AdminSDHolder Abuse
|
2019-12-30 19:55:47 +01:00 |
|
Swissky
|
bcb24c9866
|
Abusing Active Directory ACLs/ACEs
|
2019-12-30 14:22:10 +01:00 |
|
Swissky
|
4b10c5e302
|
AD mitigations
|
2019-12-26 12:09:23 +01:00 |
|