Commit graph

4506 commits

Author SHA1 Message Date
CPol
e3032d0145
GITBOOK-4308: No subject 2024-04-12 00:02:49 +00:00
cp
7198dde648
Merge pull request #843 from PythonHacker24/master
Update uart.md with information about Firmware Dumping with UART Console
2024-04-11 02:55:59 +02:00
cp
79f74ca8bc
Merge pull request #842 from ramandy007/patch-1
Update README.md to use java/jsp_shell_reverse_tcp for Tomcat TCP reverse shell war file generation
2024-04-11 02:55:11 +02:00
CPol
c7aecef3b4
GITBOOK-4307: No subject 2024-04-10 15:24:02 +00:00
cp
a94fc30ac3
Update pull_request_template.md 2024-04-10 16:47:07 +02:00
CPol
2572c94842
GITBOOK-4306: No subject 2024-04-10 13:29:30 +00:00
cp
91a2189fb2
Merge pull request #840 from jdk32f2/patch-2
Update joomla.md
2024-04-10 13:54:11 +02:00
cp
c9cd57f0c0
Merge pull request #839 from jdk32f2/patch-1
Update 1883-pentesting-mqtt-mosquitto.md
2024-04-10 13:53:46 +02:00
CPol
424789476b
GITBOOK-4305: No subject 2024-04-09 00:13:56 +00:00
Aditya Patil
369aa80c15
Update uart.md 2024-04-08 23:38:38 +05:30
cp
703c830d21
Merge pull request #841 from PythonHacker24/master
Using CH341A EEPROM Programmer and Reader to Dump and Reflash Firmware with SPI protocol
2024-04-08 16:14:36 +02:00
ramandy007
af30f0e169
Update README.md
Use correct metasploit payload for Tomcat tcp reverse shell war generation.
2024-04-08 19:19:42 +05:30
Aditya Patil
f61f29d88d
Update spi.md with images and information about firmware dumping 2024-04-08 18:53:31 +05:30
Aditya Patil
3f0e9abcd0
Add files via upload 2024-04-08 18:43:24 +05:30
Aditya Patil
1bb73ea7c9
Update spi.md with CH341a programmer 2024-04-08 18:34:50 +05:30
Aditya Patil
a1ca18503b
Update spi.md with updated information about firmware dumping and some example attack scenarios 2024-04-08 18:05:17 +05:30
jdk32f2
d4b84ab154
Update 1883-pentesting-mqtt-mosquitto.md
Fix typo and add an additional useful command.
2024-04-07 23:19:02 +00:00
Carlos Polop
35b3c7ccfe a 2024-04-08 00:51:34 +02:00
jdk32f2
295bb77de5
Update joomla.md
Add additional method.
2024-04-07 22:47:28 +00:00
Carlos Polop
4b64ce2de1 w 2024-04-08 00:37:55 +02:00
jdk32f2
f430cde389
Update 1883-pentesting-mqtt-mosquitto.md
Fix misspell.
2024-04-07 22:24:06 +00:00
CPol
aeb0e65ce9
GITBOOK-4304: No subject 2024-04-07 22:19:46 +00:00
cp
99cd795213
Merge pull request #836 from PythonHacker24/master
Using Arduino UNO R3 (Non-SMD Atmel 328p) board with a quick hack to get UART Console
2024-04-07 18:17:23 +02:00
cp
1fa723bc81
Merge branch 'master' into master 2024-04-07 18:16:52 +02:00
cp
73bcdf2d5d
Merge pull request #838 from 7Rocky/master
Canary bypass with threads
2024-04-07 18:12:38 +02:00
7Rocky
3c938cce25 Thread canary example 2024-04-07 12:29:45 +02:00
7Rocky
654219573c Added example 2024-04-07 01:31:58 +02:00
CPol
7bff273b23
GITBOOK-4302: No subject 2024-04-06 19:44:17 +00:00
CPol
c55d66804a
GITBOOK-4301: No subject 2024-04-06 16:25:58 +00:00
cp
e7515f2102
Merge pull request #837 from 7Rocky/master
Review of binary exploitation techniques
2024-04-06 17:48:18 +02:00
7Rocky
dab712071f Fix 2024-04-06 17:19:31 +02:00
7Rocky
df793a8e83 Added more techniques 2024-04-06 15:01:27 +02:00
7Rocky
1d9352d8be Added tools and fixed typos 2024-04-06 15:01:06 +02:00
7Rocky
b2ce11dbfa Added partial overwrite 2024-04-06 14:59:37 +02:00
7Rocky
09561c1a93 Minor corrections 2024-04-06 14:59:16 +02:00
7Rocky
8b39e454a4 Added more canary bypasses 2024-04-06 14:57:49 +02:00
7Rocky
b556bc5d1e Added note on Glibc GOT 2024-04-06 14:57:25 +02:00
7Rocky
cf4648a626 Added note on Glibc >= 2.34 2024-04-06 14:56:58 +02:00
7Rocky
1e25d6ed34 Fixes and small corrections 2024-04-06 14:56:37 +02:00
cp
f6b55df44c
Update SUMMARY.md 2024-04-04 12:51:38 +02:00
cp
998fbe1385
Merge pull request #793 from Legoclones/update-flask
Create Django article
2024-04-04 12:50:06 +02:00
Aditya Patil
b0c8188eef
Update uart.md
Fixed Type in the heading
2024-04-04 14:40:57 +05:30
Aditya Patil
104b771429
Update uart.md
Using Arduino UNO R3 (Non-SMD) with a quick hack to get UART connection.
2024-04-04 14:40:01 +05:30
HackTricks
765c2e1f94
Merge pull request #835 from scrypt-kitty/patch-1
Update cookie-tossing.md
2024-04-04 10:54:13 +02:00
HackTricks
47355d4b89
Merge pull request #834 from PythonHacker24/master
Updated UART Section for CP210X Adapter and Debugging UART incase of disconnection by Manufacturer
2024-04-04 10:53:56 +02:00
Ruby Perez
f8739577fd
Update cookie-tossing.md 2024-04-03 16:33:05 -04:00
Aditya Patil
db3e054c66
Merge pull request #1 from PythonHacker24/PythonHacker24-patch-1
Update uart.md
2024-04-03 11:58:04 +05:30
CPol
c412e06585
GITBOOK-4295: change request with no subject merged in GitBook 2024-04-02 19:37:55 +00:00
Aditya Patil
f99efa4d4d
Update uart.md
Updated more information about the UART access with CP210X USB to TTY adapters which are inexpensive and portable enough to connect to UART anywhere. Also updated the solution in case of disabling of UART by the manufacturer by disconnecting the pins.
2024-04-02 19:09:10 +05:30
CPol
4e1db973e9
GITBOOK-4294: change request with no subject merged in GitBook 2024-04-01 23:11:25 +00:00