mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-10 13:44:12 +00:00
Adding new tools
This commit is contained in:
parent
eaac26d15e
commit
0dd357e094
1 changed files with 1 additions and 0 deletions
|
@ -2,6 +2,7 @@
|
||||||
The following are a collection of recently-released pen test tools. I update this list every time that there is a new post and when I find a new one around the Internet. The rest of the repository has hundreds of additional cybersecurity and pen test tools.
|
The following are a collection of recently-released pen test tools. I update this list every time that there is a new post and when I find a new one around the Internet. The rest of the repository has hundreds of additional cybersecurity and pen test tools.
|
||||||
|
|
||||||
----
|
----
|
||||||
|
- [Auto-Elevate - Escalate From A Low-Integrity Administrator Account To NT AUTHORITY\SYSTEM Without An LPE Exploit By Combining A COM UAC Bypass And Token Impersonation](http://www.kitploit.com/2022/04/auto-elevate-escalate-from-low.html)
|
||||||
- [Slyther - AWS Security Tool](http://www.kitploit.com/2022/04/slyther-aws-security-tool.html)
|
- [Slyther - AWS Security Tool](http://www.kitploit.com/2022/04/slyther-aws-security-tool.html)
|
||||||
- [Spring-Spel-0Day-Poc - Spring-Cloud / spring-cloud-function, spring.cloud.function.routing-expression, RCE, 0day, 0-day, POC, EXP](http://www.kitploit.com/2022/03/spring-spel-0day-poc-spring-cloud.html)
|
- [Spring-Spel-0Day-Poc - Spring-Cloud / spring-cloud-function, spring.cloud.function.routing-expression, RCE, 0day, 0-day, POC, EXP](http://www.kitploit.com/2022/03/spring-spel-0day-poc-spring-cloud.html)
|
||||||
- [CVE-2022-22963 - PoC Spring Java Framework 0-day Remote Code Execution Vulnerability](http://www.kitploit.com/2022/03/cve-2022-22963-poc-spring-java.html)
|
- [CVE-2022-22963 - PoC Spring Java Framework 0-day Remote Code Execution Vulnerability](http://www.kitploit.com/2022/03/cve-2022-22963-poc-spring-java.html)
|
||||||
|
|
Loading…
Reference in a new issue