Releases: 0xn3va/cheat-sheets
Releases · 0xn3va/cheat-sheets
Release v1.1.4
Added
- Argument injection 2234bc6
ssh
- Command execution via authorized_keys and id_*.pub
- Command injection 0b8edca
- Using
PERL5OPT
environment variable to execute commands - Using
PERL5DB
environment variable to execute commands - Using
PERLLIB
andPERL5LIB
environment variables to execute commands - Using
PYTHONWARNINGS
environment variable to execute commands - Using
NODE_OPTIONS
environment variable to execute commands - Using
RUBYOPT
environment variable to execute commands
- Using
- HTML injection d930245
- Using
link
to exfiltrate data via DNS
- Using
- Content Security Policy fd417e5
- Common misconfigurations
- Using third-party frameworks to bypass CSP
- Abusing CSP to exfiltrate data
- Script gadgets
- GitHub Action fbe8adc
- Using
GITHUB_TOKEN
to triggerworkflow_dispatch
andrepository_dispatch
workflows in the post-exploitation stage
- Using
Updated
Release v1.1.3
Added
- Argument injection 0437b2f
awk
- Command execution via
system()
- Command execution via
curl
- Reading/writing/exfiltrating local files
find
- Command execution via
exec
andexecdir
- Writing local files using
fprintf
- Command execution via
git
- Command execution via
core.pager
in.git/config
git-diff
- Reading local files using
--no-index
or diff against/dev/null
- Reading local files using
git-fetch
- Command execution via
--upload-pack
- Command execution via
git-fetch-pack
- Command execution via
--upload-pack
and--exec
- Command execution via
git-grep
- Command execution via
-O/--open-files-in-pager
- Command execution via
git-ls-remote
- Command execution via
--upload-pack
- Command execution via
git-pull
- Command execution via
--upload-pack
- Command execution via
- Command execution via
ssh
- Command execution via
LocalCommand
inssh_config
- Command execution via
ssh-keygen
- Command execution via
-D
- Command execution via
tar
- Command execution via
--to-command
- Command execution via
-I/--use-compress-program
- Command execution via
wget
- Reading/writing/exfiltrating local files
zip
- Command execution via
-TT/--unzip-command
- Command execution via
- Docker Escaping 00adf5f
- PID Namespace Sharing
- Spring 33127c1
useSuffixPatternMatch
misconfiguration
- Command injection dac29c7
- Link to an article that describes a case of remote
LD_PRELOAD
exploitation
- Link to an article that describes a case of remote
Updated
Release v1.1.2
Added
- Parameters injection c4853f9
- Abusing
.git/HEAD
--output
parameter ingit-blame
- Maven and
pom.xml
- Abusing
Updated
- CI/CD e150e44
- GitHub Actions:
- Artifacts poisoning
- Secrets disclosure for the
workflow_call
event head.sha
andhead.ref
confusion- Unclaimed actions
- GitHub Actions:
- Weak random generation e8c2cce
- Cracking
org.apache.commons.lang3.RandomStringUtils
in Java
- Cracking
- Command injection 8e399cf and 02d58f8
- Command injections for languages (refactoring and new cases)
Release v1.1.1
Added
- Weak random generation 60983af
- SVG abuse 41ac46c
- Broken authentication 115b22a
- Email confirmation vulnerabilities
- Command injection 8f2a55a
- Using
/etc/environment
to gain code execution
- Using
- Parameters injection 32ef677
tar
checkpoints
Updated
- Container Escaping e92f379
- Linux kernel CVE list
- Cookie Security c0a6c5f
- Difference between same-site and cross-site
All changes at #132
Release v1.1.0
Added
- CI/CD 1b04bc4:
- Dependency:
- Add Dependency Confusion cheat sheet
- Add Dependency Hijaking cheat sheet
- Add Typosquatting cheat sheet
- Github:
- Add Github Actions cheat sheet
- Add Code owners cheat sheet
- Add Dependabot cheat sheet
- Add Redirect cheat sheet
- Add Releases cheat sheet
- Dependency:
Updated
Release v1.0.4
Release v1.0.3
Release v1.0.2
Added
- AWS S3: add links to tools for scanning and checking permissions #123
- Container Escaping: add info for CVE-2022-0185 in Linux Kernel #123
- Android Deep Linking: Insecure parameter handling #123
- Broken authentication: Session fixation #123
- 2FA: Mixing 2FA modes #123
Removed
- AWS S3: removed links from the Resources section #123
Release v1.0.1
Added
- Cookie Bomb #118
- Cookie Jar Overflow #118
- Cookie Tossing #118
- Spring Framework: Routing Abuse #118
- Spring Boot Actuators: Add gateway and logview actuators #118
- AWS Cognito: Misconfigured user pool access #118
- 2FA: Abuse of half-authenticated sessions #118
- CORS Misconfiguration: Server-side cache poisoning #118
- File Upload Vulnerabilities #118
- File upload race condition
- URL-based file upload race condition
- Improper Rate Limits #118
- Changing path
- Extra characters in parameters
- Reset a rate limit
- SSRF Post-exploitation: Add Java RMI research #118
Changed
Initial release
Merge pull request #117 from 0xn3va/develop Parameters injection