Windows and Unix PWN examples of binaries

Two excellent web sites with a reference on how each exe can be used Windows : https://lolbas-project.github.io/ Unix : https://gtfobins.github.io/ On Unix, there is a script based on that that would help enumerate all possible way to elevate privileges. cd /tmp...

Credential Phishing check bypass

Each system, has its limits.The Palo Alto on the latest version (tested on 9.0.1), is checking only up to 21 fields for a coupe of username and password in the bloom field.Normal creds form with 20 hidden INPUT before the Username & Password field. This shows the...

SSH Redirect

Reading Time: < 1 minuteThe following example binds local port 8834 on remote host via ssh as localhost port 8834.ssh -R 8834:localhost:8834...