keycroc-payloads/payloads/library
TW-D 79ded6cde2
"Linux" Blind OS Command Injection using Serial Number
Allows a remote attacker to execute commands on a Linux system, 
using the serial number as a vector to pass the commands to be executed, 
without receiving feedback on the results of the commands.
2024-11-14 13:38:38 -05:00
..
Incident_Response cleaned up directory structure to follow new norms 2021-09-30 09:40:27 -05:00
credentials Merge pull request #62 from spywill/master 2024-08-29 03:55:06 -04:00
execution cleaned up directory structure to follow new norms 2021-09-30 09:40:27 -05:00
exfiltration Update keystroke-reflection_exfiltration.txt 2023-11-06 06:32:33 -05:00
exploit Username Change 2024-05-28 19:35:43 +02:00
general Update README.md 2023-08-01 08:25:10 -04:00
mobile cleaned up directory structure to follow new norms 2021-09-30 09:40:27 -05:00
phishing Username Change 2024-05-28 19:35:43 +02:00
prank cleaned up directory structure to follow new norms 2021-09-30 09:40:27 -05:00
recon Add Nmap Recon 2022-02-07 03:54:46 -05:00
remote_access "Linux" Blind OS Command Injection using Serial Number 2024-11-14 13:38:38 -05:00