-
Feb 10, 2022
🇬🇧 Gaining the upper hand(le)
Author: last
Hunting for privilege escalations and UAC bypasses by looking for leaked handles in unprivileged processes
-
Feb 10, 2022
🇮🇹 Gaining the upper hand(le)
Author: last
Come trovare privilege escalation e bypass di UAC tramite leak di handle privilegiati
-
Jan 20, 2022
🇬🇧 The ace(r) up your sleeve!
Author: last
Privilege Escalation vulnerability in Acer Care Center (CVE-2021-45975)
-
Jan 20, 2022
🇮🇹 The ace(r) up your sleeve!
Author: last
Vulnerabilità Privilege Escalation nel software Acer Care Center (CVE-2021-45975)
-
Nov 25, 2021
🇬🇧 Carrying the Tortellini's golf sticks
Author: Her0_IT knifesec
Using Caddy to spin up fast and reliable C2 redirectors.
-
Oct 27, 2021
🇬🇧 Tortellini in Brodobuf
Author: Oblio MrSaighnal
How serializing data using Google’s Protobuf is not protecting your web app.
-
Sep 24, 2021
🇬🇧 Stealing weapons from the Armoury
Author: last
Root cause analysis of a privilege escalation vulnerability in ASUS ROG Armoury Crate Lite Service v4.2.8 (CVE-2021-40981)
-
Sep 24, 2021
🇮🇹 Stealing weapons from the Armoury
Author: last
Analisi della privilege escalation in ASUS ROG Armoury Crate Lite Service v4.2.8 (CVE-2021-40981)
-
Aug 21, 2021
🇬🇧 The dying knight in the shiny armour
Author: last
Killing Defender through NT symbolic links redirection while keeping it unbothered
-
Nov 16, 2020
🇬🇧 Taking a detour inside LSASS
Author: last
Extracting local hashes by hooking functions inside LSASS