Leaked Windows processes handles identification tool. Useful for identify new LPE vulnerabilities during a pentest or simply as a new research process. Currently supports exploiting (autopwn) procesess leaked handles spawning a new arbitrary process (cmd.exe default).
LHF identifies in realtime inherited handles and gives the researcher explotability tips
Presented at rootedcon 2022 https://www.rootedcon.com/ponentes-rooted2022/.
Presentation -> Presentation/Exploiting Leaked Handles for LPE.pdf
If you need secure remote desktop access on Linux, learning how to Install TeamViewer on…
If you want to test operating systems, build development labs, or safely run isolated environments,…
If you want to build JavaScript applications on Linux, learning how to Install Node.js Ubuntu…
Managing software sources is an essential part of maintaining a Linux system, and understanding APT…
Website malware is one of the biggest threats for website owners, bloggers, businesses, and WordPress…
If you want to Install Python on Ubuntu systems for development, automation, or scripting, Ubuntu…