Varshini

Sinon – Modular Windows Burn-In Automation With Generative AI For Deception

Sinon is a modular tool for automatic burn-in of Windows-based deception hosts that aims to reduce the difficulty of orchestrating…

1 year ago

HackSys Extreme Vulnerable Driver (HEVD) – BufferOverflowNonPagedPoolNx Exploit

This repository contains an exploit for the BufferOverflowNonPagedPoolNx vulnerability in HackSys Extreme Vulnerable Driver (HEVD). The exploit targets Windows 10 Version…

1 year ago

Android Autorooter Exploit : A Step-By-Step Guide

"Android Autorooter" delves into the cutting-edge possibilities of exploiting Android vulnerabilities to achieve root access. This article guides you through…

1 year ago

IFL – Interactive Functions List : Enhancing IDA Pro With Advanced Function Navigation nd Import Features

Discover the power of the IFL - Interactive Functions List, a dynamic plugin designed to elevate your experience with IDA…

1 year ago

Web3 Security Researcher Roadmap – Mastering Solidity And Smart Contract Audits By 2024

Embark on a journey to become a Web3 security expert with our comprehensive 2024 roadmap. This guide delves deep into…

1 year ago

Awesome TLS – Evading WAFs With Advanced Burp Suite Extension

This extension hijacks Burp's HTTP and TLS stack, allowing you to spoof any browser TLS fingerprint (JA3). It boosts the…

1 year ago

SMBclient-ng : A Comprehensive Tool For Managing SMB Shares

SMBclient-ng is a robust and intuitive command-line tool designed to enhance interactions with SMB shares, offering a plethora of commands…

1 year ago

MemFiles : Enhancing CobaltStrike With In-Memory File Management

MemFiles is a toolkit for CobaltStrike that enables Operators to write files produced by the Beacon process into memory, rather…

1 year ago

Fileless ELF Execution – Running Binaries In Memory With FEE

This Python script generates interpreted code which creates the supplied ELF as a file in memory and executes it (without…

1 year ago

Penetration Testing Tools – For Educational And Ethical Use

This repository contains a collection of tools and resources for penetration testing and security research. This repository is intended solely…

1 year ago