writeups.xyz writeups.xyz / Post-Exploitation

Title Vulnerabilities Programs Authors
Injecting Java In-memory Payloads For Post-exploitation
Lateral movement and on-prem NT hash dumping with Microsoft Entra Temporary Access Passes
From ChatBot To SpyBot: ChatGPT Post Exploitation
Entra ID Connect Arbitrary Password Overwrite
Technical Advisory – Multiple Vulnerabilities in Nagios XI
Unauthenticated Access to GCP Dataproc Can Lead to Data Leak
Okta For Red Teamers
Hijacking Someone Else’s DCSync
My secret to API privesc: Tapping compromised web servers
From Self-Hosted GitHub Runner to Self-Hosted Backdoor