Skip to content

Commit be31b7e

Browse files
authored
Merge branch 'master' into update_CVE-2026-22730__SQL_Injection_in_Spring_AI_s_Maria_20260319_131806
2 parents 793b947 + 007f983 commit be31b7e

122 files changed

Lines changed: 7479 additions & 4041 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.github/workflows/auto_merge_approved_prs.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -120,8 +120,9 @@ jobs:
120120
echo "Authorized user: $authorized_user"
121121
echo "Looking for PRs with exact comment 'merge' from $authorized_user..."
122122
123-
# Get all open PRs
124-
prs=$(gh_with_retry pr list --state open --json number,title,url,author --repo "$GITHUB_REPOSITORY")
123+
# Get all open PRs, paginating through the full result set instead of
124+
# relying on `gh pr list`'s default page size.
125+
prs=$(gh_with_retry api --paginate "repos/$GITHUB_REPOSITORY/pulls?state=open&per_page=100" | jq -s 'add | map({number, title, url: .html_url, author: {login: .user.login}})')
125126
126127
if [ "$prs" = "[]" ]; then
127128
echo "No open PRs found."

src/SUMMARY.md

Lines changed: 36 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,9 @@
99
# 🤩 Generic Methodologies & Resources
1010

1111
- [Pentesting Methodology](generic-methodologies-and-resources/pentesting-methodology.md)
12+
- [Fuzzing Methodology](generic-methodologies-and-resources/fuzzing.md)
1213
- [External Recon Methodology](generic-methodologies-and-resources/external-recon-methodology/README.md)
14+
- [Database Leaks](generic-methodologies-and-resources/external-recon-methodology/database-leaks.md)
1315
- [Wide Source Code Search](generic-methodologies-and-resources/external-recon-methodology/wide-source-code-search.md)
1416
- [Github Dorks & Leaks](generic-methodologies-and-resources/external-recon-methodology/github-leaked-secrets.md)
1517
- [Pentesting Network](generic-methodologies-and-resources/pentesting-network/README.md)
@@ -92,6 +94,7 @@
9294
- [Defi/AMM Hook Precision](blockchain/blockchain-and-crypto-currencies/defi-amm-hook-precision.md)
9395
- [Defi Amm Virtual Balance Cache Exploitation](blockchain/blockchain-and-crypto-currencies/defi-amm-virtual-balance-cache-exploitation.md)
9496
- [Mutation Testing With Slither](blockchain/smart-contract-security/mutation-testing-with-slither.md)
97+
- [Erc 4337 Smart Account Security Pitfalls](blockchain/blockchain-and-crypto-currencies/erc-4337-smart-account-security-pitfalls.md)
9598
- [Value Centric Web3 Red Teaming](blockchain/blockchain-and-crypto-currencies/value-centric-web3-red-teaming.md)
9699
- [Web3 Signing Workflow Compromise Safe Delegatecall Proxy Takeover](blockchain/blockchain-and-crypto-currencies/web3-signing-workflow-compromise-safe-delegatecall-proxy-takeover.md)
97100
- [Lua Sandbox Escape](generic-methodologies-and-resources/lua/bypass-lua-sandboxes/README.md)
@@ -122,27 +125,33 @@
122125
- [Cisco - vmanage](linux-hardening/privilege-escalation/cisco-vmanage.md)
123126
- [Containerd (ctr) Privilege Escalation](linux-hardening/privilege-escalation/containerd-ctr-privilege-escalation.md)
124127
- [D-Bus Enumeration & Command Injection Privilege Escalation](linux-hardening/privilege-escalation/d-bus-enumeration-and-command-injection-privilege-escalation.md)
125-
- [Docker Security](linux-hardening/privilege-escalation/docker-security/README.md)
126-
- [Abusing Docker Socket for Privilege Escalation](linux-hardening/privilege-escalation/docker-security/abusing-docker-socket-for-privilege-escalation.md)
127-
- [AppArmor](linux-hardening/privilege-escalation/docker-security/apparmor.md)
128-
- [AuthZ& AuthN - Docker Access Authorization Plugin](linux-hardening/privilege-escalation/docker-security/authz-and-authn-docker-access-authorization-plugin.md)
129-
- [CGroups](linux-hardening/privilege-escalation/docker-security/cgroups.md)
130-
- [Docker --privileged](linux-hardening/privilege-escalation/docker-security/docker-privileged.md)
131-
- [Docker Breakout / Privilege Escalation](linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation/README.md)
132-
- [release_agent exploit - Relative Paths to PIDs](linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation/release_agent-exploit-relative-paths-to-pids.md)
133-
- [Docker release_agent cgroups escape](linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation/docker-release_agent-cgroups-escape.md)
134-
- [Sensitive Mounts](linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation/sensitive-mounts.md)
135-
- [Namespaces](linux-hardening/privilege-escalation/docker-security/namespaces/README.md)
136-
- [CGroup Namespace](linux-hardening/privilege-escalation/docker-security/namespaces/cgroup-namespace.md)
137-
- [IPC Namespace](linux-hardening/privilege-escalation/docker-security/namespaces/ipc-namespace.md)
138-
- [PID Namespace](linux-hardening/privilege-escalation/docker-security/namespaces/pid-namespace.md)
139-
- [Mount Namespace](linux-hardening/privilege-escalation/docker-security/namespaces/mount-namespace.md)
140-
- [Network Namespace](linux-hardening/privilege-escalation/docker-security/namespaces/network-namespace.md)
141-
- [Time Namespace](linux-hardening/privilege-escalation/docker-security/namespaces/time-namespace.md)
142-
- [User Namespace](linux-hardening/privilege-escalation/docker-security/namespaces/user-namespace.md)
143-
- [UTS Namespace](linux-hardening/privilege-escalation/docker-security/namespaces/uts-namespace.md)
144-
- [Seccomp](linux-hardening/privilege-escalation/docker-security/seccomp.md)
145-
- [Weaponizing Distroless](linux-hardening/privilege-escalation/docker-security/weaponizing-distroless.md)
128+
- [Container Security](linux-hardening/privilege-escalation/container-security/README.md)
129+
- [Runtimes And Engines](linux-hardening/privilege-escalation/container-security/runtimes-and-engines.md)
130+
- [Runtime API And Daemon Exposure](linux-hardening/privilege-escalation/container-security/runtime-api-and-daemon-exposure.md)
131+
- [Authorization Plugins](linux-hardening/privilege-escalation/container-security/authorization-plugins.md)
132+
- [Image Security And Secrets](linux-hardening/privilege-escalation/container-security/image-security-and-secrets.md)
133+
- [Assessment And Hardening](linux-hardening/privilege-escalation/container-security/assessment-and-hardening.md)
134+
- [Sensitive Host Mounts](linux-hardening/privilege-escalation/container-security/sensitive-host-mounts.md)
135+
- [Privileged Containers](linux-hardening/privilege-escalation/container-security/privileged-containers.md)
136+
- [Distroless](linux-hardening/privilege-escalation/container-security/distroless.md)
137+
- [Protections](linux-hardening/privilege-escalation/container-security/protections/README.md)
138+
- [AppArmor](linux-hardening/privilege-escalation/container-security/protections/apparmor.md)
139+
- [Capabilities](linux-hardening/privilege-escalation/container-security/protections/capabilities.md)
140+
- [CGroups](linux-hardening/privilege-escalation/container-security/protections/cgroups.md)
141+
- [Masked Paths](linux-hardening/privilege-escalation/container-security/protections/masked-paths.md)
142+
- [No New Privileges](linux-hardening/privilege-escalation/container-security/protections/no-new-privileges.md)
143+
- [Read Only Paths](linux-hardening/privilege-escalation/container-security/protections/read-only-paths.md)
144+
- [Seccomp](linux-hardening/privilege-escalation/container-security/protections/seccomp.md)
145+
- [SELinux](linux-hardening/privilege-escalation/container-security/protections/selinux.md)
146+
- [Namespaces](linux-hardening/privilege-escalation/container-security/protections/namespaces/README.md)
147+
- [CGroup Namespace](linux-hardening/privilege-escalation/container-security/protections/namespaces/cgroup-namespace.md)
148+
- [IPC Namespace](linux-hardening/privilege-escalation/container-security/protections/namespaces/ipc-namespace.md)
149+
- [PID Namespace](linux-hardening/privilege-escalation/container-security/protections/namespaces/pid-namespace.md)
150+
- [Mount Namespace](linux-hardening/privilege-escalation/container-security/protections/namespaces/mount-namespace.md)
151+
- [Network Namespace](linux-hardening/privilege-escalation/container-security/protections/namespaces/network-namespace.md)
152+
- [Time Namespace](linux-hardening/privilege-escalation/container-security/protections/namespaces/time-namespace.md)
153+
- [User Namespace](linux-hardening/privilege-escalation/container-security/protections/namespaces/user-namespace.md)
154+
- [UTS Namespace](linux-hardening/privilege-escalation/container-security/protections/namespaces/uts-namespace.md)
146155
- [Escaping from Jails](linux-hardening/privilege-escalation/escaping-from-limited-bash.md)
147156
- [Posix Cpu Timers Toctou Cve 2025 38352](linux-hardening/privilege-escalation/linux-kernel-exploitation/posix-cpu-timers-toctou-cve-2025-38352.md)
148157
- [euid, ruid, suid](linux-hardening/privilege-escalation/euid-ruid-suid.md)
@@ -279,6 +288,7 @@
279288
- [Semanagevolume Perform Volume Maintenance Tasks](windows-hardening/windows-local-privilege-escalation/semanagevolume-perform-volume-maintenance-tasks.md)
280289
- [Service Triggers](windows-hardening/windows-local-privilege-escalation/service-triggers.md)
281290
- [Telephony Tapsrv Arbitrary Dword Write To Rce](windows-hardening/windows-local-privilege-escalation/telephony-tapsrv-arbitrary-dword-write-to-rce.md)
291+
- [Secure Desktop Accessibility Registry Propagation LPE (RegPwn)](windows-hardening/windows-local-privilege-escalation/secure-desktop-accessibility-registry-propagation-regpwn.md)
282292
- [Uiaccess Admin Protection Bypass](windows-hardening/windows-local-privilege-escalation/uiaccess-admin-protection-bypass.md)
283293
- [Windows C Payloads](windows-hardening/windows-local-privilege-escalation/windows-c-payloads.md)
284294
- [Active Directory Methodology](windows-hardening/active-directory-methodology/README.md)
@@ -819,7 +829,7 @@
819829
- [Ret2win - arm64](binary-exploitation/stack-overflow/ret2win/ret2win-arm64.md)
820830
- [Stack Shellcode](binary-exploitation/stack-overflow/stack-shellcode/README.md)
821831
- [Stack Shellcode - arm64](binary-exploitation/stack-overflow/stack-shellcode/stack-shellcode-arm64.md)
822-
- [Stack Pivoting - EBP2Ret - EBP chaining](binary-exploitation/stack-overflow/stack-pivoting-ebp2ret-ebp-chaining.md)
832+
- [Stack Pivoting](binary-exploitation/stack-overflow/stack-pivoting.md)
823833
- [Uninitialized Variables](binary-exploitation/stack-overflow/uninitialized-variables.md)
824834
- [ROP & JOP](binary-exploitation/rop-return-oriented-programing/README.md)
825835
- [BROP - Blind Return Oriented Programming](binary-exploitation/rop-return-oriented-programing/brop-blind-return-oriented-programming.md)
@@ -830,15 +840,15 @@
830840
- [Leaking libc address with ROP](binary-exploitation/rop-return-oriented-programing/ret2lib/rop-leaking-libc-address/README.md)
831841
- [Leaking libc - template](binary-exploitation/rop-return-oriented-programing/ret2lib/rop-leaking-libc-address/rop-leaking-libc-template.md)
832842
- [One Gadget](binary-exploitation/rop-return-oriented-programing/ret2lib/one-gadget.md)
833-
- [Ret2lib + Printf leak - arm64](binary-exploitation/rop-return-oriented-programing/ret2lib/ret2lib-+-printf-leak-arm64.md)
843+
- [Ret2lib + Printf leak - arm64](binary-exploitation/rop-return-oriented-programing/ret2lib/ret2lib-printf-leak-arm64.md)
834844
- [Ret2syscall](binary-exploitation/rop-return-oriented-programing/rop-syscall-execv/README.md)
835-
- [Ret2syscall - ARM64](binary-exploitation/rop-return-oriented-programing/rop-syscall-execv/ret2syscall-arm64.md)
845+
- [Ret2syscall - arm64](binary-exploitation/rop-return-oriented-programing/rop-syscall-execv/ret2syscall-arm64.md)
836846
- [Ret2vDSO](binary-exploitation/rop-return-oriented-programing/ret2vdso.md)
837847
- [SROP - Sigreturn-Oriented Programming](binary-exploitation/rop-return-oriented-programing/srop-sigreturn-oriented-programming/README.md)
838-
- [SROP - ARM64](binary-exploitation/rop-return-oriented-programing/srop-sigreturn-oriented-programming/srop-arm64.md)
848+
- [SROP - arm64](binary-exploitation/rop-return-oriented-programing/srop-sigreturn-oriented-programming/srop-arm64.md)
839849
- [Mediatek Xflash Carbonara Da2 Hash Bypass](hardware-physical-access/firmware-analysis/mediatek-xflash-carbonara-da2-hash-bypass.md)
840850
- [Synology Encrypted Archive Decryption](hardware-physical-access/firmware-analysis/synology-encrypted-archive-decryption.md)
841-
- [Windows Seh Overflow](binary-exploitation/stack-overflow/windows-seh-overflow.md)
851+
- [Windows SEH Overflow](binary-exploitation/stack-overflow/windows-seh-overflow.md)
842852
- [Array Indexing](binary-exploitation/array-indexing.md)
843853
- [Chrome Exploiting](binary-exploitation/chrome-exploiting.md)
844854
- [Common Exploiting Problems Unsafe Relocation Fixups](binary-exploitation/common-exploiting-problems-unsafe-relocation-fixups.md)

src/binary-exploitation/basic-stack-binary-exploitation-methodology/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ Something to take into account is that usually **just one exploitation of a vuln
101101

102102
#### Via EBP/RBP
103103

104-
- [**Stack Pivoting / EBP2Ret / EBP Chaining**](../stack-overflow/stack-pivoting-ebp2ret-ebp-chaining.md): Control the ESP to control RET through the stored EBP in the stack.
104+
- [**Stack Pivoting**](../stack-overflow/stack-pivoting.md): Control the ESP to control RET through the stored EBP in the stack.
105105
- Useful for **off-by-one** stack overflows
106106
- Useful as an alternate way to end controlling EIP while abusing EIP to construct the payload in memory and then jumping to it via EBP
107107

src/binary-exploitation/common-binary-protections-and-bypasses/aslr/ret2ret.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
1-
# Ret2ret & Reo2pop
1+
# Ret2ret & Ret2pop
22

33
{{#include ../../../banners/hacktricks-training.md}}
44

55
## Ret2ret
66

77
The main **goal** of this technique is to try to **bypass ASLR by abusing an existing pointer in the stack**.
88

9-
Basically, stack overflows are usually caused by strings, and **strings end with a null byte at the end** in memory. This allows to try to reduce the place pointed by na existing pointer already existing n the stack. So if the stack contained `0xbfffffdd`, this overflow could transform it into `0xbfffff00` (note the last zeroed byte).
9+
Basically, stack overflows are usually caused by strings, and **strings end with a null byte at the end** in memory. This allows to try to reduce the place pointed by an existing pointer already existing on the stack. So if the stack contained `0xbfffffdd`, this overflow could transform it into `0xbfffff00` (note the last zeroed byte).
1010

1111
If that address points to our shellcode in the stack, it's possible to make the flow reach that address by **adding addresses to the `ret` instruction** util this one is reached.
1212

src/binary-exploitation/rop-return-oriented-programing/README.md

Lines changed: 21 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -287,6 +287,21 @@ G3:
287287
ret
288288
```
289289

290+
## Shellcode via /proc/self/mem (Embedded Linux)
291+
292+
If you already have a ROP chain but **no RWX mappings**, an alternative is to **write shellcode into the current process using** `/proc/self/mem` and then jump to it. This is common on embedded Linux targets where `/proc/self/mem` can ignore write protections on executable segments in default configurations.
293+
294+
Typical chain idea:
295+
296+
```c
297+
fd = open("/proc/self/mem", O_RDWR);
298+
lseek(fd, target_addr, SEEK_SET); // e.g., a known RX mapping or code cave
299+
write(fd, shellcode, shellcode_len);
300+
((void(*)())target_addr)(); // ARM Thumb: jump to target_addr | 1
301+
```
302+
303+
If preserving `fd` is hard, calling `open()` multiple times can make it feasible to **guess the descriptor** used for `/proc/self/mem`. On ARM Thumb targets, remember to **set the low bit** when branching (`addr | 1`).
304+
290305
291306
## Protections Against ROP and JOP
292307
@@ -316,7 +331,7 @@ rop-syscall-execv/
316331
317332
318333
{{#ref}}
319-
../stack-overflow/stack-pivoting-ebp2ret-ebp-chaining.md
334+
../stack-overflow/stack-pivoting.md
320335
{{#endref}}
321336
322337
## Other Examples & References
@@ -328,6 +343,10 @@ rop-syscall-execv/
328343
- arm64, no ASLR, ROP gadget to make stack executable and jump to shellcode in stack
329344
- [https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-4.html](https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-4.html)
330345
331-
{{#include ../../banners/hacktricks-training.md}}
346+
## References
332347
348+
- [Now You See mi: Now You're Pwned](https://labs.taszk.io/articles/post/nowyouseemi/)
349+
- [TaszkSecLabs/xiaomi-c400-pwn](https://github.com/TaszkSecLabs/xiaomi-c400-pwn)
350+
351+
{{#include ../../banners/hacktricks-training.md}}
333352

src/binary-exploitation/rop-return-oriented-programing/ret2lib/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ Also in ARM64 an instruction does what the instruction does (it's not possible t
136136
Check the example from:
137137

138138
{{#ref}}
139-
ret2lib-+-printf-leak-arm64.md
139+
ret2lib-printf-leak-arm64.md
140140
{{#endref}}
141141

142142
## Ret-into-printf (or puts)

src/binary-exploitation/rop-return-oriented-programing/ret2lib/ret2lib-+-printf-leak-arm64.md renamed to src/binary-exploitation/rop-return-oriented-programing/ret2lib/ret2lib-printf-leak-arm64.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Ret2lib + Printf leak - arm64
1+
# Ret2lib + Printf leak - ARM64
22

33
{{#include ../../../banners/hacktricks-training.md}}
44

0 commit comments

Comments
 (0)