CVE-2017-2636: exploit the race condition in the n_hdlc Linux kernel driver bypassing SMEP
https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html
https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html
Alexander Popov
CVE-2017-2636: Exploit the race condition in the n_hdlc Linux kernel driver
This article discloses the exploitation of CVE-2017-2636, which is a race condition in the n_hdlc Linux kernel driver. My PoC exploit for x86_64 gains root privileges bypassing Supervisor Mode Execution Protection (SMEP).
CVE-2017-3881 Cisco Catalyst RCE Proof-Of-Concept
https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/
https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/
Artem Kondratenko
CVE-2017-3881 Cisco Catalyst RCE Proof-Of-Concept
Digging deep into CIA Vault 7 documents to craft Proof-Of-Concept remote code execution for Cisco Catalyst switches
CVE-2017-0199: In the Wild Attacks Leveraging HTA Handler
https://www.fireeye.com/blog/threat-research/2017/04/cve-2017-0199-hta-handler.html
https://www.fireeye.com/blog/threat-research/2017/04/cve-2017-0199-hta-handler.html
Mandiant
CVE-2017-0199: In the Wild Attacks Leveraging HTA Handler | Mandiant
So awesome! (Exploiting b43xx WiFi chipsets)
https://googleprojectzero.blogspot.nl/
https://googleprojectzero.blogspot.nl/
googleprojectzero.blogspot.co.uk
Project Zero
News and updates from the Project Zero team at Google
canyoupwn.me:
BeRoot - Windows Privilege Escalation Tool
http://www.kitploit.com/2017/04/beroot-windows-privilege-escalation-tool.html
BeRoot - Windows Privilege Escalation Tool
http://www.kitploit.com/2017/04/beroot-windows-privilege-escalation-tool.html
KitPloit - PenTest Tools for your Security Arsenal ☣
BeRoot - Windows Privilege Escalation Tool
BeRoot(s) is a post exploitation tool to check commun Windows misconfigurations to find a way to escalate our privilege. A compiled...
Adobe File Upload Bypass to Remote Code Execution
https://youtu.be/ZqSHvgTCPn4
https://youtu.be/ZqSHvgTCPn4
YouTube
Adobe Remote Code Execution
Hala işleme aşamasında olduğundan içeriği ve detayları gösteremedim.