frompwnimport*fromLibcSearcherimport*# from ae64 import AE64# from ctypes import cdllfilename='./vuln'context.arch='amd64'context.log_level='debug'# context.terminal = ['tmux', 'neww']local=1all_logs=[]elf=ELF(filename)libc=elf.libciflocal:sh=process(filename)else:sh=remote('localho...
Escalating privileges with ACLs in Active Directory aclpwn.py Invoke-ACLPwnAbusing IPv6 with mitm6Compromising IPv4 networks via IPv6 mitm6SID History AbuseWUT IS DIS?: If we manage to compromise a child domain of a forest and SID filtering isn't enabled (most of the times is not), we ...