• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

process

  1. dEEpEst

    Reverse Engineering DbgChild - Debug Child Process Tool

    DbgChild - Debug Child Process Tool  DbgChild is a stand alone tool for debugging child processes (auto attach). DbgChild can be used in conjunction with a plugin for a debugger. Currently DbgChild supports a plugin for the x86/x64 x64dbg debugger. Support for DbgChild can be extended to...
  2. 1

    Exploits Microsoft Windows Silent Process Exit Persistence

    This Metasploit module uploads a payload and declares that it is the debug process to launch when a specified process exits. View the full article
  3. dEEpEst

    Process Explorer v16.30

    Introduction Ever wondered which program has a particular file or directory open? Now you can find out. Process Explorer shows you information about which handles and DLLs processes have opened or loaded. The Process Explorer display consists of two sub-windows. The top window always shows a...
  4. itsMe

    sqlmap v1.3.7 automates the process of detecting and exploiting SQL injection flaws

    Sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches...
  5. 1

    Exploits Blue Prism Robotic Process Automation (RPA) Privilege Escalation

    Blue Prism Robotic Process Automation (RPA) versions prior to 6.5.0.12573 suffer from a privilege escalation vulnerability. View the full article
  6. 1

    Exploits Microsoft Windows LUAFV Delayed Virtualization Cross Process Handle Duplication Privilege Escalation

    On Microsoft Windows, the LUAFV driver doesn't take into account a virtualized handle being duplicated to a more privileged process resulting in elevation of privilege. View the full article
  7. 1

    Exploits VMware Host VMX Process COM Class Hijack Privilege Escalation

    The VMX process (vmware-vmx.exe) process configures and hosts an instance of VM. As is common with desktop virtualization platforms the VM host usually has privileged access into the OS such as mapping physical memory which represents a security risk. To mitigate this the VMX process is created...
  8. 1

    Exploits VMware Host VMX Process Impersonation Hijack Privilege Escalation

    The VMX process (vmware-vmx.exe) process configures and hosts an instance of VM. As is common with desktop virtualization platforms the VM host usually has privileged access into the OS such as mapping physical memory which represents a security risk. To mitigate this the VMX process is created...
  9. 1

    Exploits Remote Process Explorer 1.0.0.16 Denial Of Service

    Remote Process Explorer version 1.0.0.16 denial of service proof of concept exploit with SEH overwrite. View the full article
Back
Top