-
## *Web Shell Suspicious Process Tree* (I´m not good in naming things >___
-
Using a fresh install of kali linux and metasploit v5.0.96-dev-
No matter what exploit module I try and use I get the error Exploit failed: An exploitation error occurred.
An example below but I…
-
Invidious is currently using https://anti-captcha.com to solve and bypass captchas.
I and many others feel negatively about supporting an exploitative mechanical turk-like company to enable invidio…
-
It would be cool having something like:
```sql
select * from Log where date >= date() - 1h
```
In this case `h` stands for hour. We could have `d` for days. This query extract all the logs of …
-
My docker version is:
```
docker --version
Docker version 20.10.2, build 2291f61
```
My windows version is:
```
systeminfo
Nom du système d’exploitation: Microsoft Windows…
-
**Where the vulnerability is**
A command is "parsed" in the check_and_parse_command function according to the space separator and, after that, a switch statement is used to construct the correct co…
-
#### System information
Geth version: 1.9.23-stable-8c2f2715
OS & Version: Ubuntu 20.04.1 LTS
Commit hash : (see above)
#### Expected behaviour
After Geth creates the snapshot, performance …
-
There is a Write-What-Where vulnerability exposed through SMC calls to the guest
kernel which may lead to code execution in EL2. The function psci_reg() is
accessible from the smccall() handler at […
-
Hello everyone,
I now get the Web-GUI properly install and i can generate windows payload from it without problems. I also get my ports open and i can see my bot (main OS) on the web gui when doubl…
-
Unable TO find type [PS Credential]: make sure that the assembly containing this step loaded
![image](https://user-images.githubusercontent.com/59155410/110228802-9df56a00-7f36-11eb-9e88-19546efc814…