Explore >> Select a destination


You are here

pentestmonkey.net
| | cocomelonc.github.io
0.9 parsecs away

Travel
| | [AI summary] The post explains reverse shell techniques in cybersecurity, detailing how attackers use them to gain remote control over a target system by connecting back to their machine, with examples in various programming languages and tools like netcat.
| | 0xcybery.github.io
1.4 parsecs away

Travel
| | Demonstration of how you can insert a file at the right location, you can use it to hijack Python execution.
| | www.thexero.co.uk
2.4 parsecs away

Travel
| | The Symantec Encryption Management Server is used by organisations of all sizes and typicly sites within an organisations DMZ. However, during an engagement, a number of serious security vulnerabilities were found within the appliance itself, many of which can lead to Remote Code Execution by an malicious attacker.
| | pliutau.com
26.2 parsecs away

Travel
| Software Engineering Lead with a passion for APIs, Web, Cloud, Microservices, DevOps, Kubernetes etc. Engineering Lead at solsten.io