Hacker News
- Abusing url handling in iTerm2 and Hyper for code execution https://vin01.github.io/piptagole/escape-sequences/iterm2/hyper/url-handlers/code-execution/2024/05/21/arbitrary-url-schemes-terminal-emulators.html 56 comments
- Abusing url handling in iTerm2 and Hyper for code execution https://vin01.github.io/piptagole/escape-sequences/iterm2/hyper/url-handlers/code-execution/2024/05/21/arbitrary-url-schemes-terminal-emulators.html 2 comments netsec
Linking pages
Linked pages
- iTerm2 - macOS Terminal Replacement https://www.iterm2.com/news.html 257 comments
- Hyper™ https://hyper.is/ 216 comments
- Downloads - iTerm2 - macOS Terminal Replacement https://iterm2.com/downloads.html 170 comments
- ANSI escape code - Wikipedia https://en.wikipedia.org/wiki/ANSI_escape_code 63 comments
- Donate - iTerm2 - macOS Terminal Replacement https://iterm2.com/donate.html 35 comments
- From Terminal Output to Arbitrary Remote Code Execution | solid-snail blog https://blog.solidsnail.com/posts/2023-08-28-iterm2-rce 4 comments
- GitHub - Alhadis/OSC8-Adoption: List of terminal emulators that support hyperlinks (OSC 8 escape sequences). https://github.com/Alhadis/OSC8-Adoption 1 comment
Related searches:
Search whole site: site:vin01.github.io
Search title: Abusing url handling in iTerm2 and Hyper for code execution | Vin01’s Blog
See how to search.