Pentest Notes
Search...
Ctrl
K
🎓
Road to certification
CPTS
Linux Privilege Escalation
5.Linux Internals-based Privilege Escalation
18.Kernel-exploits
19.Shared-libraries
20.Shared-object-hijacking
21.Python-library-hijacking
Previous
17.Miscellaneous-techniques
Next
18.Kernel-exploits
Last updated
12 days ago