ComDotNetExploit is a Proof of Concept (PoC) tool designed to demonstrate the exploitation of Windows Protected Process Light (PPL) by…
Trigon is a sophisticated deterministic kernel exploit targeting Appleās iOS devices, leveraging the CVE-2023-32434 vulnerability. This exploit, developed by Alfie…
Bug bounty report templates are essential tools for streamlining the process of documenting vulnerabilities. They ensure that hackers provide clear,…
FullBypass is a tool designed to circumvent Microsoft's Antimalware Scan Interface (AMSI) and PowerShell's Constrained Language Mode (CLM). By doing…
Carseat is a Python-based tool that replicates the functionality of the well-known security auditing tool, Seatbelt. It includes nearly all…
The Atomic Red Team is an open-source framework designed to help security teams emulate adversarial tactics and techniques in alignment…
SCCMHunter is a Python-based post-exploitation tool designed for security professionals to identify, profile, and exploit System Center Configuration Manager (SCCM)…
The eBPF File Creation Blocker is a cutting-edge security module designed to prevent file creation in specified directories using the…
The DeepSeek-Vulnerability-Analyzer is an innovative extension for Burp Suite that leverages AI-driven capabilities to enhance vulnerability detection and analysis. By…
GraphRunner is a powerful post-exploitation toolset designed for interacting with the Microsoft Graph API, enabling red teams and attackers to…