HackSys Extreme Vulnerable Driver (HEVD) – BufferOverflowNonPagedPoolNx Exploit

11 months ago

This repository contains an exploit for the BufferOverflowNonPagedPoolNx vulnerability in HackSys Extreme Vulnerable Driver (HEVD). The exploit targets Windows 10 Version…

Android Autorooter Exploit : A Step-By-Step Guide

11 months ago

"Android Autorooter" delves into the cutting-edge possibilities of exploiting Android vulnerabilities to achieve root access. This article guides you through…

PPLBlade: Advanced Memory Dumping and Obfuscation Tool

11 months ago

Protected Process Dumper Tool that support obfuscating memory dump and transferring it on remote workstations without dropping it onto the…

IFL – Interactive Functions List : Enhancing IDA Pro With Advanced Function Navigation nd Import Features

11 months ago

Discover the power of the IFL - Interactive Functions List, a dynamic plugin designed to elevate your experience with IDA…

Web3 Security Researcher Roadmap – Mastering Solidity And Smart Contract Audits By 2024

11 months ago

Embark on a journey to become a Web3 security expert with our comprehensive 2024 roadmap. This guide delves deep into…

Awesome TLS – Evading WAFs With Advanced Burp Suite Extension

11 months ago

This extension hijacks Burp's HTTP and TLS stack, allowing you to spoof any browser TLS fingerprint (JA3). It boosts the…

SMBclient-ng : A Comprehensive Tool For Managing SMB Shares

11 months ago

SMBclient-ng is a robust and intuitive command-line tool designed to enhance interactions with SMB shares, offering a plethora of commands…

MemFiles : Enhancing CobaltStrike With In-Memory File Management

11 months ago

MemFiles is a toolkit for CobaltStrike that enables Operators to write files produced by the Beacon process into memory, rather…

Fileless ELF Execution – Running Binaries In Memory With FEE

11 months ago

This Python script generates interpreted code which creates the supplied ELF as a file in memory and executes it (without…

Penetration Testing Tools – For Educational And Ethical Use

11 months ago

This repository contains a collection of tools and resources for penetration testing and security research. This repository is intended solely…