logo
Red team
Python pickle
  • Green team
  • Blue team
  • Purple team
  • Ty Myrddin
Initializing search
      • IN: Where the falcons and foxes roam
      • THROUGH: Where the raccoons burrow and rummage
        • The art of staying where you are not wanted
          • Persistence notes: The raccoon’s field guide to staying unnoticed
          • Digging under the shed: Linux privilege escalation
          • Dumpster diving behind the windows store
          • Persistence training grounds: Mastering the art of sticking around
            • Where the raccoon learns to never leave
            • Burrows, backdoors, and bashful shenanigans
              • Bash: System 1
              • sudo: weak configuration
              • Bash: System 2
              • LaTeX: Input
              • Powershell: Command Injection
              • Bash: unquoted expression injection
              • Perl: Command injection
              • Bash: cron
              • Python input()
              • Python pickle
            • Basic TCP reverse shell
            • Execute system commands
            • Keylogger
            • Backdoor
            • Bypasses
        • Where the raccoon overflows the bin—on purpose
        • Foraging for secrets in binaries
        • The payload is in the picnic photo
        • Tipping the stack—and the garbage can
        • Nature’s cheats: The raccoon’s guide to slipping through the cracks
      • OUT: Where squirrels swipe the crown jewels

    Python pickle¶

    root-me challenge: Python - pickle: Authenticate as admin and capture the flag from .passwd file.


    HackTricks: Bypass pickle sandbox with the default installed python packages


    Last update: 2025-05-12 14:16
    Back to top
    Previous Python input()
    Next Where the raccoon overflows the bin—on purpose
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7