|
You are here |
0xboku.com | ||
| | | | |
www.ghostccamm.com
|
|
| | | | | Strapi had multiple critical vulnerabilities that could be chained together to gain Unauthenticated Remote Code Execution. This is my public disclosure of the vulnerabilities I found in Strapi, how they were patched and some nonsensical ramblings. | |
| | | | |
taeluralexis.com
|
|
| | | | | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies. | |
| | | | |
thatsn0tmy.site
|
|
| | | | | Hi folks! I recently read about a few vulnerabilities on Terramaster which were basically stolen from me heavily inspired by my previous ones, so I decided to look into Terramaster again, just to find a few more. Ah. This time I didn't spend much time reasearching, and I couldn't find an auth bypass so you will need valid credentials to reach the RCEs. Don't worry tho, you ransomware operators can still get the admin hashes and username. Some assembly hashcat required. | |
| | | | |
hymd3a.hatenablog.com
|
|
| | | (2022-06-20 ?? -2025-07-14??) ???Windows???????????Windows Termianl????????????????????????????????????????????? WSL ????????? | Microsoft Learn WSL2???????????Windows Terminal????????????????/etc/hosts???????????????? Web???????????????? ??? WSL2 ? hosts file ????? Advanced settings configuration i... | ||