This workflow performs automated recon and subdomain takeover checks every time there's a push to the main branch. All results are stored in the results/ directory and automatically committed back to the repo.
CVE-2025-32463 is a critical local privilege escalation vulnerability in the Sudo utility, affecting versions 1.9.14 to 1.9.17. With a CVSS score of 9.3, this flaw allows an unprivileged local user to execute arbitrary code as root by exploiting improper path resolution in Sudoβs --chroot (-R) option. Discovered by Qualysβ Threat Research Unit, the vulnerability stems from Sudoβs handling of the /etc/nsswitch.conf file within a user-controlled chroot environment, enabling the loading of a malicious shared library. This analysis details the vulnerabilityβs mechanics, exploitation process, impact, and mitigation strategies.
- Software: Sudo (System Utility for Delegating Authority)
- Versions: 1.9.14 to 1.9.17 (patched in 1.9.17p1)
- Platforms: Linux systems using
/etc/nsswitch.conf(e.g., Ubuntu, Debian, SUSE, Red Hat) - Introduced: The
--chrootoption, added in Sudo 1.9.14 to enhance containerized environment support
package main
import (
"encoding/json"
"flag"
"fmt"
"io/ioutil"
"net/http"
"os"(function () {
const suspiciousSources = [
'location',
'location.href',
'location.search',
'document.URL',
'document.documentURI',
'document.referrer'
];(async function () {
const delay = ms => new Promise(resolve => setTimeout(resolve, ms));
const clickMuteButton = async () => {
const replies = document.querySelectorAll('[data-testid="tweet"]');
for (const reply of replies) {
const blueCheck = reply.querySelector('svg[aria-label="Verified account"]');
if (blueCheck) {
const moreOptionsButton = reply.querySelector('[aria-label="More"]');
if (moreOptionsButton) {This script is a Go-based website crawler designed to detect potential vulnerabilities to clickjacking attacks. It works by examining HTTP headers such as X-Frame-Options and Content-Security-Policy.
- Crawling Capability: Recursively scans all reachable URLs within the same domain starting from the base URL.
- Header Analysis:
- Detects the presence and values of the
X-Frame-Optionsheader. - Parses
Content-Security-Policydirectives forframe-ancestorsto evaluate iframe embedding restrictions.
- Detects the presence and values of the
- Vulnerability Classification:
- Protected: URLs with sufficient protections (
X-Frame-OptionsorCSP frame-ancestors).
- Protected: URLs with sufficient protections (
| const startDate = new Date('2022-01-01'); | |
| const endDate = new Date('2023-01-01'); | |
| const waitForElemToExist = async (selector, timeout = 5000) => { | |
| return new Promise((resolve) => { | |
| const element = document.querySelector(selector); | |
| if (element) return resolve(element); | |
| const observer = new MutationObserver(() => { | |
| const element = document.querySelector(selector); |
Date: August 13, 2024
Pentester: Eno Leriand
#!/bin/bash
# Variables
HOSTAPD_CONF="/tmp/evil_twin/hostapd.conf"
DNSMASQ_CONF="/tmp/evil_twin/dnsmasq.conf"
PHISHING_PAGE_DIR="/tmp/evil_twin/www"
PHISHING_PAGE="$PHISHING_PAGE_DIR/index.html"
CAPTURE_FILE="/tmp/evil_twin/capture.txt"
HOTSPOT_IP="192.168.20.1"
| #!/bin/bash | |
| battery_status=$(acpi | awk '{print $3}') | |
| battery_percentage=$(acpi | awk '{print $4}' | sed 's/,//') | |
| if [ "$battery_status" == "Discharging," ]; then | |
| icon="π" | |
| else | |
| icon="π" |