Liste des notes
Docker - Escalation of privileges - Capabilities
Using capabilities to escape from a container ...
- Escalation
Docker - Escalation of privilege - Misconfigured Docker Socket
Elevate your privileges with Docker and sockets ...
- Escalation
Windows reconnaissance commands
Reconnaissace with simple commands ...
- Recon
Useful links for Windows Privilege Escalation
List of links and tools ...
- Escalation
Enable RDP with metasploit
Using metasploit to activate RDP ...
- Post
Enable WinRM with metasploit
Using metasploit and Powershell to activate WinRM ...
- Post
Escalation with shared libraries
Exploit shared libraries ...
- Escalation
Pivoting with metasploit and autoroute
Use metasploit for pivoting ...
- Post
Useful links to escalate your privileges on Linux
List of resources for privilege escalation ....
- Escalation
Linux privilege escalation with tar
Privilege escalation with tar and the use of wildcard ...
- Escalation
Writing a Penetration Testing Report
Structure of a pentest report ...
- Info
Linux Privilege Escalation [passwd/shadow]
Exploit /etc/shadow ...
- Escalation
Brute force directories and files names
Create a sitemap by brute force ...
- Recon
HTTP server recognition
Commands to identify HTTP servers ...
- Recon
Addons Firefox
Addons Firefox ...
- Navigateur
Memcached
Reconnaissance of memcached ...
- Recon
Challenges/Labs
List of sites and tools to have fun ...
- Labs
Database: CVE and exploits
List of public databases where to find vulnerabilities
- CVE
Useful OSINT websites
Search in public databases ...
- OSINT