GitHub - machine1337/TelegramRAT: Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions github.com/machine1337/Te…
A really cool writeup from @kevin_mizu about a bug in draw.io. It looks like the writeup has some of tricks learnt from my research! Super happy to see the real world applications of my techniques 😊 And thanks for the shout out!
huntr.dev/bounties/4c1c5…
@doctorthompson yes the same thing with polkit pkexec it has to be an old vulnerability but they bring this up now and the impact is pretty much the same.
@nopsIide How in the hell had none of us ever tried this before? I mean, it seems like it should have been discovered years ago, no?
Ever hear a stand-up comedian ask, “Why didn’t I think of that joke?” … I get it.
The lowest user "nobody" could use this simple bash script and allows anybody to overwrite data in arbitrary read-only files (CVE-2022-0847)
It is similar to CVE-2016-5195 “Dirty Cow” but is easier to exploit. dirtypipe.cm4all.com#infosec#CVE
We've posted some in-depth guidance on how to make Turbo Intruder attacks go as fast as possible. If you think we're missing any tricks, let us know!
#tuning" target="_blank" rel="nofollow noopener">portswigger.net/research/turbo…