Collateral Damage – Unveiling The Xbox Kernel Exploit

1 year ago

Collateral Damage is a kernel exploit for Xbox SystemOS using CVE-2024-30088. It targets Xbox One and Xbox Series consoles running kernel…

CVE-2024-38063 : A Deep Dive Into Remote Code Execution In tcpip.sys

1 year ago

This is a (rather flaky) poc for CVE-2024-38063, a RCE in tcpip.sys patched on August 13th 2024. I didn't find and…

CompTIA – Understanding Techniques, Threats, And Cybersecurity Defenses

1 year ago

Explore the essential concepts, techniques, and security challenges covered in the CompTIA Security+ certification 1.1 - Compare And Contrast Different…

LiteSpeed Cache Privilege Escalation PoC – CVE-2024-28000

1 year ago

This repository contains a Proof of Concept (PoC) script for exploiting a privilege escalation vulnerability in the LiteSpeed Cache WordPress…

MagiskEoP – Unpacking The Silent Root Exploit In Magisk

1 year ago

This is an exploit for a vulnerability in Magisk app that allows a local app to silently gain root access…

VeilTransfer – Mastering Data Exfiltration Simulation For Enhanced Cybersecurity

1 year ago

VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exfiltration…

Deep-HLR : Harnessing The Power Of Defastra For Comprehensive Phone Number Analysis

1 year ago

This script uses the Defastra Deep Phone HLR Check API, aiming to be a tool in fraud prevention and osint…

Windows Downdate – Mastering The Art Of OS Downgrade Attacks

1 year ago

A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities. Presented at Black Hat…

3proxy – Features, Installation, And Usage Guide

1 year ago

The versatile capabilities of 3proxy, a robust and lightweight proxy server designed for a variety of network tasks. From basic…

JYso – A Comprehensive Guide To Advanced JNDI And Serialization Exploits

1 year ago

JYso is a tool that can be used as both ysoserial and JNDIExploit. It also has bypass functions of multiple JNDI…