🇬🇧 Gaining the upper hand(le)
Hunting for privilege escalations and UAC bypasses by looking for leaked handles in unprivileged processes
🇮🇹 Gaining the upper hand(le)
Come trovare privilege escalation e bypass di UAC tramite leak di handle privilegiati
🇬🇧 The ace(r) up your sleeve!
Privilege Escalation vulnerability in Acer Care Center (CVE-2021-45975)
🇮🇹 The ace(r) up your sleeve!
Vulnerabilità Privilege Escalation nel software Acer Care Center (CVE-2021-45975)
🇬🇧 Carrying the Tortellini's golf sticks
Using Caddy to spin up fast and reliable C2 redirectors.
🇬🇧 Tortellini in Brodobuf
How serializing data using Google’s Protobuf is not protecting your web app.
🇬🇧 Stealing weapons from the Armoury
Root cause analysis of a privilege escalation vulnerability in ASUS ROG Armoury Crate Lite Service v4.2.8 (CVE-2021-40981)
🇮🇹 Stealing weapons from the Armoury
Analisi della privilege escalation in ASUS ROG Armoury Crate Lite Service v4.2.8 (CVE-2021-40981)
🇬🇧 The dying knight in the shiny armour
Killing Defender through NT symbolic links redirection while keeping it unbothered
🇬🇧 Taking a detour inside LSASS
Extracting local hashes by hooking functions inside LSASS