Sec-88
Ctrlk
  • 🧑Whoami
  • 🕸️Web-AppSec
  • ✉️API-Sec
  • 📱Android-AppSec
  • IOS-AppSec
  • 📶Network-Sec
  • 💻Desktop AppSec
    • Thin Client vs. Thick Client
  • ☁️Cloud Sec
  • 👨‍💻Programming
  • 🖥️Operating Systems
  • ✍️Write-Ups
Powered by GitBook
On this page

Was this helpful?

Edit

💻Desktop AppSec

LogoSecVulturewww.infosecinstitute.com

How did I gain RCE and dump the database from the exploit desktop application?

DisLaugh | 0xL4ugh CTF 2024

Beyond the Desktop: Exploiting a Leaked Token for API | Strik3r Blog

Desktop Application Penetration Testing (1)

LogoGitHub - DEMON1A/Brocmon: Modified version of Process monitor that bypasses procmon detection for anti-debuggersGitHub
PreviousBasic AD PentestingNextThin Client vs. Thick Client

Last updated 5 months ago

Was this helpful?