COURSE AUTHOR ā
Peter A
What you'll learn :
1. Exploit Linux misconfigurations to get Root
2. How to get Root on Linux systems
3. How to crack Linux passwords
4. All about SUID, passwd and others
Course Link
Maybe change it to a rating system, users can rate the deliverables for quality of thread, and to also auto ban people abusing and spamming and phishing?
Another Local Windows privilege escalation using a new potato technique ;)
The LocalPotato attack is a type of NTLM reflection attack that targets local authentication. This attack allows for arbitrary file read/write and elevation of privilege.
NOTE: This vulnerability has been fixed by...
I offer Microsoft Office Exploit ( exe > doc ) FUD silent 100% for sale
info :
1. Item name : Microsoft Office
2. Affected OS:
Windows 7 32/64bit , Windows 8.1 32/64bit , windows 10 32/64bit
3. Vulnerable Target application versions and reliability. If 32 bit only, is 64 bit...
any
app
bit
bypasses
code
crash
delivery
doc
does
edition
email
exe
execute
execution
exploit
exploitation
fud
info
item
its
level
medium
microsoft
office
os
pack
pe
perform
privilege
remote
required
rt
service
shellcode
silent
target
that
user
uses
version
vulnerable
windows
without
word
yes
'https
17362
activate
after
alt
android
apk
application
apply
be
below
box
but
button
call
case
change
changed
changer
check
click
control
core
crax
day
de
depending
device
dl
done
download
downloading
easy
either
equipment
every
everything
files
first
follow
follow'
framework
from
full
go
helps
here
how
identification
identity
imei
important
info
install
installer
installing
international
jpg
life
likes
link
mark
members
mobile
module
modules
most
much
next
number
numbers
open
original
our
perform
phone
post
privilege
pro
provide
random
restart
root
run
screen
section
see
several
sim
single
step
tdsf0x
that
theft
then
there
thing
tick
tracking
true
two
type
very
wait
want
well
which
will
ya
yet
zip
š„