lv6lv Goto Github PK
Name: LV6
Type: User
Name: LV6
Type: User
Awesome Docker Compose samples
Persistence techniques for windows.
The LKM rootkit working in Linux Kernels 2.6.x/3.x/4.x/5.x
This is a manipulated chattr binary for King of the Hill matches. It is basically chattr but with a twist.
Challenges for Binary Exploitation Workshop
PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)
# DMZ Exploitation This week, you will apply the techniques you learned in class to pivot across subnets and attack a DMZ. ## Background on DMZs Most commonly, machines on a LAN send requests to the public Internet through a router, which forwards requests to the web after performing NAT, and forwards responses back to the requesting host on the LAN. This router typically has a firewall that only allows connections to/from certain ports, such as 80 and 443 (HTTP and HTTPS) . Network engineers can add an additional layer of protection to the network by installing a **DMZ (demilitarized zone)**, which acts as an additional layer of protection in front of an existing network. Only a _single_ machine separates the LAN pictured above from the public Internet: the `pfSense` router. In a DMZ, a whole _network sits in between. Recall that when machines on a LAN communicate on the Internet, they _all_ forward packets straight through the **default gateway**. When data comes back from the Internet, the gateway filters and forward it to the proper host on the LAN. Data passes through two gateways on its way through a DMZ. First, it passes through a router from the Internet into a network called the DMZ. This router typically runs a firewall that filters out all traffic that the organization doesn't expect—e.g., it may only allow connections to HTTP/HTTPS, email, and SSH ports into the DMZ. ![Dual-firewall DMZ](https://upload.wikimedia.org/wikipedia/commons/thumb/6/60/DMZ_network_diagram_2_firewall.svg/960px-DMZ_network_diagram_2_firewall.svg.png) **Note**: This is Creative Commons: https://commons.wikimedia.org/wiki/File:DMZ_network_diagram_2_firewall.svg From there, machines on the DMZ can forward requests to machines on the internal network. Sensitive data is typically stored only in the internal network, _not_ on machines in the DMZ. Clients on the public Internet interact with that data by sending requests to the machines Interaction with that data is done _through_ machines in the DMZ, which act as proxies. This means that attackers who compromise a machine in the DMZ do _not_ immediately own the machines in the internal network, and because it gives network administrators fine control over _exactly_ how services from the internal network are exposed to the outside world. One well-motivated use case for a DMZ is that of public web servers in a DMZ communicating with databases in an internal network.
DNS-Shell is an interactive Shell over DNS channel
Learning docker and my first docker compose network with examples
Your senpai's dotfiles
Gray Hat Hacking v6
A simple script to hide a process
a deepce-based script that will return useful information about the container for you to escape.
This is a small BASH script to quickly setup all the tools I would want and need on a new machine.
A script to protect your king in KoTH
Portable (static / old glibc linked) Linux binaries for red-team / blue-team
Linux Kernel Hacking
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)
📙 Amazon Web Services — a practical guide
Source code for creating online ambulance booking system called Aarogya Ambulance Booking Service using Php,Css,Html,Xampp Server & MySql database,PhpMyAdmin etc.
President's Cup Cybersecurity Competition Challenges
Fancy reverse and bind shell handler
Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation
Python PTY backdoors - full PTY or nothing!
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.