Explore >> Select a destination


You are here

pentestlab.blog
| | scriptjunkie.us
2.9 parsecs away

Travel
| | [AI summary] The post details eight specific Windows features and services, such as SCM and Task Scheduler, that can be exploited to perform authenticated remote code execution on networked systems.
| | bohops.com
3.0 parsecs away

Travel
| | [Source: blog.microsoft.com] What is Vshadow? Vshadow (vshadow.exe) is a command line utility for managing volume shadow copies. This tool is included within the Windows SDK and is signed by Microsoft (more on this later). Vshadow has a lot of functionality, including the ability to execute scripts and invoke commands in support of volume shadow snapshot...
| | cocomelonc.github.io
1.2 parsecs away

Travel
| |
| | www.uptycs.com
15.8 parsecs away

Travel
| Take a deep dive into the critical CVE-2023-46214 RCE vulnerability in Splunk, learn about its exploitation & find out how to stay secure.