aptw.tf
Open in
urlscan Pro
2606:4700:3036::6815:10b9
Public Scan
Submitted URL: http://aptw.tf/
Effective URL: https://aptw.tf/
Submission: On June 26 via api from US — Scanned from DE
Effective URL: https://aptw.tf/
Submission: On June 26 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
APT::WTF - APTortellini's blog The Collective * Feb 10, 2022 🇬🇧 GAINING THE UPPER HAND(LE) AUTHOR: LAST HUNTING FOR PRIVILEGE ESCALATIONS AND UAC BYPASSES BY LOOKING FOR LEAKED HANDLES IN UNPRIVILEGED PROCESSES * Feb 10, 2022 🇮🇹 GAINING THE UPPER HAND(LE) AUTHOR: LAST COME TROVARE PRIVILEGE ESCALATION E BYPASS DI UAC TRAMITE LEAK DI HANDLE PRIVILEGIATI * Jan 20, 2022 🇬🇧 THE ACE(R) UP YOUR SLEEVE! AUTHOR: LAST PRIVILEGE ESCALATION VULNERABILITY IN ACER CARE CENTER (CVE-2021-45975) * Jan 20, 2022 🇮🇹 THE ACE(R) UP YOUR SLEEVE! AUTHOR: LAST VULNERABILITÀ PRIVILEGE ESCALATION NEL SOFTWARE ACER CARE CENTER (CVE-2021-45975) * Nov 25, 2021 🇬🇧 CARRYING THE TORTELLINI'S GOLF STICKS AUTHOR: HER0_IT KNIFESEC USING CADDY TO SPIN UP FAST AND RELIABLE C2 REDIRECTORS. * Oct 27, 2021 🇬🇧 TORTELLINI IN BRODOBUF AUTHOR: OBLIO MRSAIGHNAL HOW SERIALIZING DATA USING GOOGLE’S PROTOBUF IS NOT PROTECTING YOUR WEB APP. * Sep 24, 2021 🇬🇧 STEALING WEAPONS FROM THE ARMOURY AUTHOR: LAST ROOT CAUSE ANALYSIS OF A PRIVILEGE ESCALATION VULNERABILITY IN ASUS ROG ARMOURY CRATE LITE SERVICE V4.2.8 (CVE-2021-40981) * Sep 24, 2021 🇮🇹 STEALING WEAPONS FROM THE ARMOURY AUTHOR: LAST ANALISI DELLA PRIVILEGE ESCALATION IN ASUS ROG ARMOURY CRATE LITE SERVICE V4.2.8 (CVE-2021-40981) * Aug 21, 2021 🇬🇧 THE DYING KNIGHT IN THE SHINY ARMOUR AUTHOR: LAST KILLING DEFENDER THROUGH NT SYMBOLIC LINKS REDIRECTION WHILE KEEPING IT UNBOTHERED * Nov 16, 2020 🇬🇧 TAKING A DETOUR INSIDE LSASS AUTHOR: LAST EXTRACTING LOCAL HASHES BY HOOKING FUNCTIONS INSIDE LSASS Subscribe * Advanced Persistent Tortellini Home of the Advanced Persistent Tortellini - aka APTortellini, an Italian collective of hackers publishing technical research regarding offensive security. * * *