Welcome to the Cyber Library your ultimate resource for everything cybersecurity. Whether you're a seasoned professional seeking new defense strategies, a beginner eager to learn the basics, or an expert wanting to keep up with new stuffs, you've come to the right place.
Our mission is to provide clear, accurate, and up-to-date information on all aspects of cybersecurity.
Cyber Library is sponsored and maintained by the team of : https://www.cyberexperts.io/
Cyber Library is currently under construction
Latest Articles :SMTP
OS
‣
Linux Wildcards Spare tricks
Linux SSH Forward Agent exploitation
Linux Splunk LPE and Persistence
Linux Socket Command Injection
Linux SELinux
Linux RunC Privilege Escalation
Linux Payloads to execute
Linux Node inspector/CEF debug abuse
Linux NFS no_root_squash/no_all_squash misconfiguration PE
Linux Linux Capabilities
Linux Linux Active Directory
Linux ld.so privesc exploit example
Linux Logstash
Linux lxd/lxc Group - Privilege escalation
Linux Interesting Groups - Linux Privesc
Linux euid, ruid, suid
Linux Escaping from Jails
Linux Weaponizing Distroless
Linux Seccomp
Linux UTS Namespace
Linux User Namespace
Linux Time Namespace
Linux Network Namespace
Linux Mount Namespace
Linux PID Namespace
Linux IPC Namespace
Linux CGroup Namespace
Linux Namespaces
Linux Sensitive Mounts
Linux Docker release_agent cgroups escape
Linux release_agent exploit - Relative Paths to PIDs
Linux Docker Breakout / Privilege Escalation
Linux Docker --privileged
Linux CGroups
Linux AuthZ& AuthN - Docker Access Authorization Plugin
Linux AppArmor
Linux Abusing Docker Socket for Privilege Escalation
Linux Docker Security
Linux D-Bus Enumeration & Command Injection Privilege Escalation
Linux Containerd (ctr) Privilege Escalation
Linux Cisco - vmanage
Linux Arbitrary File Write to Root
‣
macOS Proces Abuse (1)
macOS Function Hooking (1)
macOS Python Applications Injection (1)
macOS Apps - Inspecting, debugging and Fuzzing
macOS File Extension & URL scheme app handlers
macOS Bypassing Firewalls
macOS XPC Authorization
macOS PID Reuse
macOS xpc_connection_get_audit_token Attack
macOS XPC Connecting Process Check
macOS MIG - Mach Interface Generator
macOS XPC
macOS IPC - Inter Process Communication
macOS .Net Applications Injection
macOS Dirty NIB
macOS Ruby Applications Injection
macOS BundlesPyscript
macOS Universal binaries & Mach-O Format
macOS Memory Dumping (1)
macOS Security & Privilege Escalation (1)
macOS Privilege Escalation
macOS TCC Payloads (1)
macOS TCC Bypasses
macOS Apple Scripts
macOS TCC
macOS Security Protections
macOS Gatekeeper / Quarantine / XProtect
macOS SIP (1)
macOS xattr-acls extra stuff
macOS GCD - Grand Central Dispatch
macOS Chromium Injection
macOS Office Sandbox Bypasses
macOS Default Sandbox Debug (1)
macOS Java Applications Injection
macOS Dyld Hijacking & DYLD_INSERT_LIBRARIES
macOS Library Injection
macOS Useful Commands
‣
Windows Windows C Payloads
Windows SeImpersonate from High To System
Windows SeDebug + SeImpersonate copy token
Windows RoguePotato, PrintSpoofer, SharpEfsPotato, GodPotato
Windows Privilege Escalation with Autoruns
Windows Named Pipe Client Impersonation
Windows MSI Wrapper
Windows Leaked Handle Exploitation
Windows JuicyPotato
Windows Integrity Levels
Windows From High Integrity to SYSTEM with Name Pipes
Windows DPAPI - Extracting Passwords
Windows Dll Hijacking
Windows COM Hijacking
Windows Create MSI with WIX
Windows AppendData/AddSubdirectory permission over service registry
Windows ACLs - DACLs/SACLs/ACEs
Windows Access Tokens
Windows Abusing Tokens
‣
Windows Unconstrained Delegation
Windows Skeleton Key
Windows Silver Ticket
Windows SID-History Injection
Windows Security Descriptors
Windows Resource-based Constrained Delegation
Windows RDP Sessions Abuse
Windows Privileged Groups
Windows Force NTLM Privileged Authentication
Windows PrintNightmare
Windows Password Spraying / Brute Force
Windows Pass the Ticket
Windows Over Pass the Hash/Pass the Key
Windows MSSQL AD Abuse
Windows LAPS
Windows Kerberos Double Hop Problem
Windows Kerberos Authentication
Windows Kerberoast
Windows Golden Ticket
Windows External Forest Domain - One-Way (Outbound)
Windows External Forest Domain - OneWay (Inbound) or bidirectional
Windows DSRM Credentials
Windows Diamond Ticket
Windows DCSync
Windows DCShadow
Windows Custom SSP
Windows Constrained Delegation
Windows BloodHound & Other AD Enum Tools
Windows ASREPRoast
Windows AD DNS Records
Windows AD information in printers
Windows AD CS Certificate Theft
Windows AD CS Domain Persistence
Windows AD CS Domain Escalation
Windows AD CS Account Persistence
Windows AD Certificates
Windows AD Certificates
Windows Abusing Active Directory ACLs/ACEs
‣
‣
‣
Virtualisation
Cloud
Languages
Concepts
Red Team
Pentests
Cryptography
Prepare the payload script to execute on the host
CBC - Cipher Block Chaining
Stego Tricks (1)
Generate Certificates
Create a certificate for 'Code Signing' (1)
Methodologies
Social Networks (interesting accounts)
Cyber Library Database
References
If you'd like to provide corrections or clarifications to the content on Cyber Library, please do so by visiting this link: . A Notion account is required to submit your insights.
Cyber Library