• Toggle sidebar
Necrum Security Labs logo
  • Blog
  • Portfolio
  • 3 scary tools that use Shodan search engine 3 ways to become root by exploiting the .bashrc file A hidden web shell in the plug-in wireless Planex MZK-DP150N | CVE-2021-37289 Are professional hackers also excellent magicians? Bob’s Cap - CTF Challenge Build your own WiFi Pineapple Tetra for $7. Crack Me 1 - CTF Challenge Crack Me 2 - CTF Challenge CTF Flag Mart - CTF Challenge Damn Cheap Cipher 2 - CTF Challenge Emoji - CTF Challenge Flask Task - CTF Challenge Hacker Kombat (THE GAME) - CTF Challenge Hackermon - CTF Challenge I Love Listings - CTF Challenge JabberJaw - Convert your router in portable network attack device. Not So Simple Cipher - CTF Challenge Pug a Plenty - CTF Challenge Secure any URL or Qr Code with a password! Simple Cipher - CTF Challenge Triva Unsecured - CTF Challenge VPN Ivacy, insecure design vulnerability discovered. Zipper - CTF Challenge
    Show All CTF Cryptography Forensics Hak5 JabberJaw MIPS_24Kc OpenWrt Privacy Reconnaissance Reverse Engineering SharkJack Shell Shodan Tools Web WiFi WiFi Pineapple backdoor bash cve script vulnerability
    3 ways to become root by exploiting the .bashrc file

    Saturday, August 14th 2021
    backdoor, bash

    You did it! You have discovered a vulnerability and successfully exploited it. Congratulations, you have gained access to the server. However, as your ...

    Are professional hackers also excellent magicians?

    Monday, July 12th 2021
    bash, script

    Generally speaking, the pattern is always the same. You will find a vulnerability, you will exploit it, then comes the part of privileges escalation. ...


    0xSamy_ NeroTeam Security Labs (NSLabs).
    © All right reserved 2023