|
You are here |
www.thexero.co.uk | ||
| | | | |
0xcybery.github.io
|
|
| | | | | Demonstration of how you can insert a file at the right location, you can use it to hijack Python execution. | |
| | | | |
cocomelonc.github.io
|
|
| | | | | [AI summary] A technical tutorial explaining reverse shells, including definitions, common ports, firewall circumvention, listener setup, various command-line examples (netcat, bash, python, C), and defense strategies. | |
| | | | |
www.thezdi.com
|
|
| | | | | [AI summary] This blog post discusses two critical vulnerabilities in the Logsign Unified SecOps Platform, CVE-2024-5716 (authentication bypass) and CVE-2024-5717 (command injection), which can be combined for remote, unauthenticated code execution. | |
| | | | |
www.mh4ckt3mh4ckt1c4s.xyz
|
|
| | | From HTB Business CTF 2022 | ||