Sec-88
search
⌘Ctrlk
Sec-88
  • 🧑Whoami
  • 🕸️Web-AppSec
  • ✉️API-Sec
  • 📱Android-AppSec
  • appleIOS-AppSec
  • 📶Network-Sec
  • 💻Desktop AppSec
    • Thin Client vs. Thick Client
  • ☁️Cloud Sec
  • 👨‍💻Programming
  • 🖥️Operating Systems
  • ✍️Write-Ups
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit

💻Desktop AppSec

LogoSecVulturewww.infosecinstitute.comchevron-right

How did I gain RCE and dump the database from the exploit desktop application?arrow-up-right

DisLaugh | 0xL4ugh CTF 2024arrow-up-right

Beyond the Desktop: Exploiting a Leaked Token for API | Strik3r Blogarrow-up-right

Desktop Application Penetration Testing (1)arrow-up-right

LogoGitHub - DEMON1A/Brocmon: Modified version of Process monitor that bypasses procmon detection for anti-debuggersGitHubchevron-right
PreviousBasic AD Pentestingchevron-leftNextThin Client vs. Thick Clientchevron-right

Last updated 7 months ago