hackchurch-bible

NIX PrivEsc

After you gain access to a Unix / Linux machine you'll want to conduct on-target recon to find vectors for privilege escalation.

Edit this page on GitHub