Linux
APT manager and malicious repositoryAbuse MySQL as rootAbusing root privileges in a docker containerApache Derby Embedded Java DatabaseApache2 Privilege EscalationApport-cli PrivescAria2 Privilege EscalationAria2c Privilege EscalationAutomated Enumeration Scripts for Linux HostsBash scripting language vulnerabilitiesBinary SymlinksBorg backupsCapabilitiesCronjobsDatabasesDiamorphine rootkitDisk Group Privilege EscalationDoas SUID privilege escalationDocker Group Privilege EscalationDosbox Privilege EscalationDuplicati Privilege EscalationEnvironment VariablesFail2Ban Privilege EscalationGameoverlayFS kernel exploit (CVE-2023-2640 and CVE-2023-32629)Git Hook ExploitationGit Python RCE CVE-2022-24439.mdHping3 Privilege EscalationKernel ExploitsLD_PRELOADLXC-LXD GroupLinux Local Password AttacksLogrotateManual Enumeration CommandsMore privesc techniquesNFS-Network-File-SharingNginx Privilege EscalationOpenVPN Privilege EscalationPATHPasspie password managerPasswd Binary Privilege EscalationPostfix Privilege EscalationProcmon Privilege EscalationPython Privilege EscalationQpdf privilege escalationBreaking out of restricted Bash (rbash) CLI in SSHRuby YAML DeserializationSSH agent socket file accessShared LibraryShared Object InjectionSudo < 1.8.28Sudoers fileTcpdump Privilege EscalationTmux Session HijackingWeak File PermissionsX11
Last updated