Swissky
|
aba6874517
|
Maps API + secretsdump enabled user/pw last set + certutil mimikatz
|
2020-02-06 21:41:29 +01:00 |
|
Swissky
|
9c4578f083
|
Merge pull request #155 from socketz/master
Updated Java & Groovy Shells
|
2020-02-06 16:42:35 +01:00 |
|
socketz
|
056161fd9f
|
Updated Java & Groovy Shells
Added threaded shells and alternative pure Java reverse shell
|
2020-02-06 15:43:58 +01:00 |
|
Swissky
|
37cfa0826e
|
Merge pull request #154 from antonioCoco/patch-1
Added fully interactive reverse shell for windows
|
2020-02-06 00:36:25 +01:00 |
|
antonioCoco
|
50a376337d
|
Update Reverse Shell Cheatsheet.md
|
2020-02-05 23:29:43 +01:00 |
|
Swissky
|
fb76fdc331
|
Windows Firewall + DLL hijacking + Named pipes
|
2020-02-01 22:12:36 +01:00 |
|
Swissky
|
8a19532f27
|
Merge pull request #152 from mcgyver5/master
Add Exploit for Telerik CVE-2017-9428
|
2020-01-29 00:06:57 +01:00 |
|
mcgyver5
|
667ae82aff
|
fixing typo in file name
|
2020-01-28 17:41:01 +00:00 |
|
mcgyver5
|
bef710fccd
|
add Telerik CVE attacks Telerik UI for ASP.NET ajax dialog handler
|
2020-01-28 17:33:30 +00:00 |
|
Tim
|
7d41cd750d
|
Merge pull request #1 from swisskyrepo/master
Merge pull request #151 from mcgyver5/master
|
2020-01-28 12:26:20 -05:00 |
|
Swissky
|
3840683bed
|
Merge pull request #151 from mcgyver5/master
add Telerik CVE-2019-18935
|
2020-01-27 20:13:28 +01:00 |
|
mcgyver5
|
44c68ca4e9
|
add Telerik CVE-2019-18935
|
2020-01-27 15:57:10 +00:00 |
|
Swissky
|
323a012488
|
Race Condition - First Draft
|
2020-01-26 12:43:59 +01:00 |
|
Swissky
|
eefa2afab1
|
Merge pull request #150 from austinsonger/master
Added CVE
|
2020-01-23 10:10:23 +01:00 |
|
Austin Songer
|
aacd095452
|
Added link to exploit creator
|
2020-01-22 17:49:47 +00:00 |
|
Austin Songer
|
b6e7ad655f
|
Add Technology Affected
|
2020-01-22 17:49:03 +00:00 |
|
Austin Songer
|
d54fa1ef26
|
ADDED CVE: CVE-2019-19781
|
2020-01-22 17:47:38 +00:00 |
|
Swissky
|
be0397fa68
|
BloodHound ZIP + Zero Width space tip
|
2020-01-19 22:46:45 +01:00 |
|
Swissky
|
590b7681e4
|
Merge pull request #146 from mzfr/patch-1
Update TTY shell command for python
|
2020-01-17 17:11:46 +01:00 |
|
Swissky
|
7920b4a124
|
Merge pull request #149 from ksg97031/patch-1
Add escaped double or single quote cases
|
2020-01-17 10:36:34 +01:00 |
|
ksg
|
aabb48125f
|
Add escaped double or single quote cases
|
2020-01-17 10:41:12 +09:00 |
|
Swissky
|
cfcf955a33
|
Merge pull request #148 from clirimemini/patch-1
Create 0xcela_event_handlers.txt
|
2020-01-15 18:13:41 +01:00 |
|
Çlirim Emini
|
d3ce3924a9
|
Create 0xcela_event_handlers.txt
|
2020-01-15 17:00:26 +01:00 |
|
Mehtab Zafar
|
8dc1e3c5fe
|
Update TTY shell command for python
Made the command to use python3 because mostly now the machines have python3 installed.
|
2020-01-10 17:57:53 +05:30 |
|
Swissky
|
7ab6750655
|
Merge pull request #145 from ayomawdb/master
Change IP and port to a common value across commands
|
2020-01-09 12:44:19 +01:00 |
|
Ayoma Wijethunga
|
7f34c01794
|
Change IP and port to a common value across commands
|
2020-01-09 16:20:49 +05:30 |
|
Ayoma Wijethunga
|
96b9adb98b
|
Change IP and port to a common value across commands
|
2020-01-09 16:17:35 +05:30 |
|
Swissky
|
742c7ee3c2
|
AppLocker rules
|
2020-01-06 23:03:54 +01:00 |
|
Swissky
|
71171fa78b
|
SSRF exploiting WSGI
|
2020-01-05 22:11:28 +01:00 |
|
Swissky
|
3a9b9529cb
|
Mimikatz - Credential Manager & DPAPI
|
2020-01-05 17:27:02 +01:00 |
|
Swissky
|
73abdeed71
|
Kerberos AD GPO
|
2020-01-05 16:28:00 +01:00 |
|
Swissky
|
b052f78d95
|
Blacklist3r and Machine Key
|
2020-01-02 23:33:04 +01:00 |
|
Swissky
|
97015e4f64
|
Merge pull request #143 from gdemarcsek/patch-1
Added another PHP reverse shell payload
|
2020-01-02 22:37:45 +01:00 |
|
György Demarcsek
|
9c188139ec
|
Added PHP reverse shell
This reverse shell payload for PHP works even if `exec` is disabled and/or the new socket is not on fd 3
|
2020-01-02 19:27:35 +01:00 |
|
Swissky
|
0850839b25
|
Merge pull request #142 from mikesiegel/mike_ssrf
Added anti-SSRF header bypass for GCP
|
2020-01-01 12:44:41 +01:00 |
|
mikesiegel
|
e024afc9f7
|
Added anti-SSRF header bypass for GCP.
|
2019-12-31 15:11:58 +00:00 |
|
mikesiegel
|
7aa2761e3e
|
Added anti-SSRF header bypass for GCP. Similar technique works on Azure and AWS I'm guessing.
|
2019-12-31 15:07:20 +00:00 |
|
Swissky
|
0a6ac284c9
|
AdminSDHolder Abuse
|
2019-12-30 19:55:47 +01:00 |
|
Swissky
|
bcb24c9866
|
Abusing Active Directory ACLs/ACEs
|
2019-12-30 14:22:10 +01:00 |
|
Swissky
|
4b10c5e302
|
AD mitigations
|
2019-12-26 12:09:23 +01:00 |
|
Swissky
|
1535c5f1b3
|
Kubernetes - Privileged Service Account Token
|
2019-12-20 11:33:25 +01:00 |
|
Swissky
|
cf5a4b6e97
|
XSLT injection draft
|
2019-12-17 21:13:59 +01:00 |
|
Swissky
|
02f714d479
|
Merge pull request #139 from nizam0906/patch-5
Fixed Broken Links in Directory traversal
|
2019-12-17 19:19:35 +01:00 |
|
Swissky
|
ada158cd60
|
Merge pull request #138 from nizam0906/patch-4
Fixed Broken Links in Command Injection
|
2019-12-17 19:18:54 +01:00 |
|
Swissky
|
4c96a5a6ef
|
Merge pull request #137 from nizam0906/patch-3
Updated Summary and Fixed Broken Links in CSRF
|
2019-12-17 19:18:34 +01:00 |
|
Swissky
|
976403034c
|
Merge pull request #136 from nizam0906/patch-2
Added Summary in CRLF
|
2019-12-17 19:18:11 +01:00 |
|
nizam0906
|
6939499bed
|
Fixed Broken Links in Directory traversal
|
2019-12-17 22:35:35 +05:30 |
|
nizam0906
|
4de5a20376
|
Fixed Broken Links in Command Injection
|
2019-12-17 22:29:17 +05:30 |
|
nizam0906
|
156ea32217
|
Updated Summary and Fixed Broken Links in CSRF
|
2019-12-17 22:21:53 +05:30 |
|
nizam0906
|
d6d649e08f
|
Added Summary in CRLF
|
2019-12-17 22:12:35 +05:30 |
|