Pueue is a command-line task management tool for sequential and parallel execution of long-running tasks.
Ussage
https://github.com/Nukesor/pueue/wiki/Get-started
Ussage
https://github.com/Nukesor/pueue/wiki/Get-started
GitHub
GitHub - Nukesor/pueue: :stars: Manage your shell commands.
:stars: Manage your shell commands. Contribute to Nukesor/pueue development by creating an account on GitHub.
Forwarded from IOSSec
Started my way of linux kernel exploitation yesterday from perfect article about character device drivers and some more internals. (Resource seems to be very interesting, I should dig into it)
link: https://linux-kernel-labs.github.io/refs/heads/master/labs/device_drivers.html
#kernel #linux #drivers
link: https://linux-kernel-labs.github.io/refs/heads/master/labs/device_drivers.html
#kernel #linux #drivers
Specta walkthrough
https://te.legra.ph/Haker---HTB-Spectra-Pentestim-WordPress-i-povyshaem-privilegii-v-Unix-07-02
https://te.legra.ph/Haker---HTB-Spectra-Pentestim-WordPress-i-povyshaem-privilegii-v-Unix-07-02
Telegraph
Хакер - HTB Spectra. Пентестим WordPress и повышаем привилегии в Unix
Содержание статьи Разведка Сканирование портов Сканирование веб-контента Точка входа WordPress Точка опоры Продвижение Локальное повышение привилегий Сегодня мы с тобой пройдем легкую машину с площадки Hack The Box под названием Spectra. Мы будем…
Ophiuchi walkthrough
https://te.legra.ph/HTB-Ophiuchi-Uchimsya-pentestit-parser-i-rekompilirovat-WASM-07-07-2
https://te.legra.ph/HTB-Ophiuchi-Uchimsya-pentestit-parser-i-rekompilirovat-WASM-07-07-2
Telegraph
HTB Ophiuchi. Учимся пентестить парсер и рекомпилировать WASM
Содержание статьи Разведка Сканирование портов Точка входа Точка опоры Продвижение Локальное повышение привилегий В этой статье я покажу прохождение машины Ophiuchi с площадки Hack The Box. На ее примере мы сначала попентестим SnakeYAML, а затем будем…
An article about cve-2021-3438, a vurnabilety in many printers
https://labs.sentinelone.com/cve-2021-3438-16-years-in-hiding-millions-of-printers-worldwide-vulnerable/
https://labs.sentinelone.com/cve-2021-3438-16-years-in-hiding-millions-of-printers-worldwide-vulnerable/
SentinelOne
CVE-2021-3438: 16 Years In Hiding - Millions of Printers Worldwide Vulnerable - SentinelLabs
A high severity flaw in HP, Samsung and Xerox printer drivers has existed since 2005 and could lead to an escalation of privilege.
Forwarded from IOSSec
An awesome series of articles about linux rootkit internals (with capturing all fresh changes in kernel). This resource provides a great base for reverse engineers who want to understand architecture of this malware class.
links:
https://xcellerator.github.io/posts/linux_rootkits_01 (first)
https://xcellerator.github.io/posts/linux_rootkits_11/ (last)
#rootkits #reverse_engineering #kernel
links:
https://xcellerator.github.io/posts/linux_rootkits_01 (first)
https://xcellerator.github.io/posts/linux_rootkits_11/ (last)
#rootkits #reverse_engineering #kernel
Linux Rootkits Part 1: Introduction and Workflow
Linux Rootkits Part 1: Introduction and Workflow :: TheXcellerator
Learning about Linux rootkits is a great way to learn more about how the kernel works. What’s great about it is that, unless you really understand what the kernel is doing, your rootkit is unlikely to work, so it serves as a fantasic verifier.
In the FreeBSD…
In the FreeBSD…
Forwarded from IOSSec
Small collection of articles about hacking linux kernel for beginners. (Special thanks to Matt for providing sources!)
1) https://pwning.systems/posts/an-introduction-to-kernel-exploitation-part1/
2) https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/linux-kernel-rop-ropping-your-way-to-part-1/
3) https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/
4) https://meowmeowxw.gitlab.io/ctf/3k-2021-klibrary/
5) https://ptr-yudai.hatenablog.com/entry/2020/03/16/165628#seq_operations
6) https://syst3mfailure.io/hotrod
7) https://www.vsecurity.com/download/papers/slob-exploitation.pdf
#kernel #pwn #internals
1) https://pwning.systems/posts/an-introduction-to-kernel-exploitation-part1/
2) https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/linux-kernel-rop-ropping-your-way-to-part-1/
3) https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/
4) https://meowmeowxw.gitlab.io/ctf/3k-2021-klibrary/
5) https://ptr-yudai.hatenablog.com/entry/2020/03/16/165628#seq_operations
6) https://syst3mfailure.io/hotrod
7) https://www.vsecurity.com/download/papers/slob-exploitation.pdf
#kernel #pwn #internals
Ломаем Винду через блокнот
https://martyniak-it.company/2020/01/02/vyrus%d1%8b-v-bloknote-za-2-mynut%d1%8b/
https://martyniak-it.company/2020/01/02/vyrus%d1%8b-v-bloknote-za-2-mynut%d1%8b/
25 skills for pentesters
https://www.infosecmatter.com/top-25-penetration-testing-skills-and-competencies-detailed/
https://www.infosecmatter.com/top-25-penetration-testing-skills-and-competencies-detailed/
InfosecMatter
Top 25 Penetration Testing Skills and Competencies (Detailed) - InfosecMatter
List of 25 penetration testing skills every professional penetration tester or ethical hacker should have. Also applicable to red teamers and security auditors.
