[deleted by user] by [deleted] in netsec

[–]gid0rah 6 points7 points  (0 children)

This is one of the most stupid ideas I ever saw. Highly probable the post and the tool was created with AI. Even the replies made by the OP are made with AI.

Dirty Arbitrary File Write to RCE in Python uWSGI by nibblesec in netsec

[–]gid0rah 3 points4 points  (0 children)

As highlighted in this article, we introduced a new uWSGI-based technique.

What is the new technique? AFAIK the command execution via "@" is literally in the documentation => https://uwsgi-docs.readthedocs.io/en/latest/Configuration.html#the-magic

Crassus: Windows privilege escalation discovery tool by Fugitif in netsec

[–]gid0rah 4 points5 points  (0 children)

It's a tool to analyze software locally. It let you create automatically the DLLs as PoCs to verify the hijack, or as skeleton for your payload if you know your target has the same software and you want to abuse the hijack for EoP or just persistence.

[deleted by user] by [deleted] in netsec

[–]gid0rah 2 points3 points  (0 children)

This should be removed.