Hijacking (intercepting) system calls by writing and installing a very basic kernel module to the Linux kernel.
-
Updated
Feb 25, 2020 - C
Hijacking (intercepting) system calls by writing and installing a very basic kernel module to the Linux kernel.
Pentesting Live Targets
Technique to inject and execute code in a remote process by hijacking an existing thread.
A rust framework for hooking functions loaded from dynamic libraries on Linux
An utility class for determining static compilation functions in any ELF file.
Social Network Analysis focused on the events of 9/11/2001. By examining publicly available data through SNA techniques, we gain insights into the organizational structure of the terrorist network, offering valuable perspectives on key relationships and connections.
A simple walkthrough on Windows Screensaver Hijacking for persistence.
Hijack user account through phishing web site with use of helium browser
O objevo geral do trabalho é desenvolver uma aplicação usando raw sockets para sequestrar conexões TCP
利用 UIAutomation 劫持当前浏览器地址栏并跳转至指定域名。
Rust-based SSH agent that prevents hijacking by requiring confirmation for each signature request and supports multiple sub-agents for managing diverse keys.
A threat actor may access the user's account using a stolen or leaked valid (existing) session identifier
This repository details an IDOR vulnerability in AbsysNet 2.3.1, which allows a remote attacker to brute-force session IDs via the /cgi-bin/ocap/ endpoint. Successful exploitation can compromise active user sessions, exposing authentication tokens in HTML. The attack is limited to active sessions and is terminated if the user logs out.
A utility leveraging Windows mechanisms to intercept process creation by registering a debugger in the system registry.
This repository contains the exploits to Linux VM binaries provided by Exploits1 course by opensecuritytraining
Add a description, image, and links to the hijacking topic page so that developers can more easily learn about it.
To associate your repository with the hijacking topic, visit your repo's landing page and select "manage topics."