CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

3 months ago

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within the Chromium web browser which…

Rust BOFs – Unlocking New Potentials In Cobalt Strike

3 months ago

This took me like 4 days (+2 days for an update), but I got it working... rust core + alloc…

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

3 months ago

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is a 100% custom-built C# LDAP…

Cloudkicker – Implementing Basic Authentication ith .htaccess And htpasswd

3 months ago

There are a number of excellent tutorials. I recommend this one: Basically, you are going to create a .htaccess file…

Pwnlook – A Deep Dive Into Outlook Email Exploitation

3 months ago

Pwnlook is an offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to…

EDRenum-BOF : Compiling Insights On Endpoint Detection And Response

3 months ago

In the evolving landscape of cybersecurity, understanding and mitigating threats through advanced tools is paramount. "EDRenum-BOF" emerges as a critical…

Penelope – A Versatile Shell Handler For Exploiting RCE Vulnerabilities

3 months ago

Penelope is a shell handler designed to be easy to use and intended to replace netcat when exploiting RCE vulnerabilities.…

Vulnhuntr – Unleashing LLMs For Advanced Security Vulnerability Detection In Codebases

3 months ago

Vulnhuntr leverages the power of LLMs to automatically create and analyze entire code call chains starting from remote user input…

LsassReflectDumping – A Deep Dive Into Secure Credential Extraction Techniques

3 months ago

This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is…

CVE-2024-30090 : LPE Proof Of Concept Detailed

3 months ago

In the evolving landscape of cybersecurity, understanding the mechanisms behind vulnerabilities is crucial for both mitigation and responsible exploitation. This…