Add wadcoms, gtfobins (#6214)
parent
30b60181d6
commit
380a3cd3e6
3 changed files with 86 additions and 10 deletions
@ -0,0 +1,8 @@ |
||||
# GTFOBINS |
||||
|
||||
GTFOBins (GTFOBINS) is a curated list of Unix binaries that can be exploited by attackers to bypass local security restrictions on a misconfigured system. It provides a detailed index of commands and scripts, demonstrating how certain binaries, when used improperly, can enable privilege escalation, file manipulation, and other unauthorized activities, thus serving as a resource for both security professionals to understand potential vulnerabilities and for attackers to identify and exploit weaknesses. |
||||
|
||||
Learn more from the following resources: |
||||
|
||||
- [@opensource@GTFOBins/GTFOBins.github.io](https://gtfobins.github.io/) |
||||
- [@video@Mastering Privilege Escalation: A Comprehensive Guide on GTFOBins](https://www.youtube.com/watch?v=gx6CTtWohLQ) |
@ -0,0 +1,8 @@ |
||||
# WADCOMS |
||||
|
||||
WADcoms (Web Application Dangerous Commands) is a comprehensive database of dangerous web application commands and patterns that can be exploited to compromise web security. It offers a catalog of potentially harmful commands and their contexts, helping security professionals identify and mitigate risks associated with web applications by understanding how these commands can be misused for attacks like SQL injection, cross-site scripting (XSS), and remote code execution (RCE). |
||||
|
||||
Learn more from the following resources: |
||||
|
||||
- [@opensource@WADComs/WADComs.github.io](https://wadcoms.github.io/) |
||||
- [@article@WADComs: Windows/Active Directory Interactive Cheat Sheet](https://john-woodman.com/research/wadcoms/) |
Loading…
Reference in new issue