CPTS
Ctrl
k
LinkedIn
Exploit AD
HackTheBox
More
Copy
Welcome!
Useful Links
Linux
The Discovery and Exploitation of CVE-2022-25636 · Nick Gregory
nickgregory.me
Hatching - Automated malware analysis solutions
hatching_io
Deep Dive Into Stageless Meterpreter Payloads | Rapid7 Blog
Rapid7
Meterpreter Payload Deep Dive
PayloadsAllTheThings/Methodology and Resources/Windows - Privilege Escalation.md at master · swisskyrepo/PayloadsAllTheThings
GitHub
Linux Authentication Mechanism
GitHub - GhostPack/Rubeus: Trying to tame the three-headed dog.
GitHub
Internet Archive: Scheduled Maintenance
web.archive.org
https://ytnuobgub.gitbook.io/htb/htb-academy-web-modules-for-cbbh/file-inclusion
ytnuobgub.gitbook.io
LFI2RCE via phpinfo() - HackTricks
book.hacktricks.xyz
https://linuxconfig.org/how-to-use-special-permissions-the-setuid-setgid-and-sticky-bits
linuxconfig.org
HackTheBox – Book
Ivan's IT learning blog
Windows
Security Update Guide - Microsoft Security Response Center
msrc.microsoft.com
How User Account Control works
MicrosoftLearn
https://unit42.paloaltonetworks.com/exploitation-of-windows-cve-2019-0708-bluekeep-three-ways-to-write-data-into-the-kernel-with-rdp-pdu/
unit42.paloaltonetworks.com
Security Subsystem Architecture
MicrosoftLearn
Pass-the-Hash Is Dead: Long Live LocalAccountTokenFilterPolicy
Medium
Windows - Privilege Escalation - Internal All The Things
swisskyrepo.github.io
End Of Life Dates for Microsoft Windows and Office | Michael Spice
Michael Spice | Michael Spice IT Services
Previous
ToDo
Next
Exploits
Last updated
10 months ago
Linux
Windows