Cyber security

EchoDrv – Unveiling Kernel Vulnerabilities In ECHOAC Anti-Cheat Driver echo_driver.sys

In the realm of cybersecurity, the relentless battle between attackers and defenders rages on. Enter EchoDrv, a potent tool that…

2 years ago

Ghost – Unmasking The Intricacies Of A Remote Access Trojan

Ghost is a light RAT that gives the server/attacker full remote access to the user's command-line interpreter (cmd.exe). They are allowed to execute…

2 years ago

LOLSpoof – A Clever Technique To Evade Command Line Detection And Maintain OPSEC

LOLSpoof is a an interactive shell program that automatically spoof the command line arguments of the spawned process. Just call…

2 years ago

FalconHound – Empowering Blue Teams With Automated BloodHound Integration

FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more…

2 years ago

Uscrapper 2.0 – Unleashing The Power Of OSINT Web Scraping For Data Extraction

Introducing Uscrapper 2.0, A powerfull OSINT webscrapper that allows users to extract various personal information from a website. It leverages…

2 years ago

GSSAPI-Abuse : Leveraging Kerberos Stacks For Authentication Abuse

gssapi-abuse was released as part of my DEF CON 31 talk. A full write up on the abuse vector can…

2 years ago

DllNotificationInjection – Exploring A Novel Threadless Process Injection Technique

DllNotificationInection is a POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification…

2 years ago

httpAlive – URL Analysis Tool For Web Application Penetration Test

Discover 'httpAlive,' a powerful URL analysis tool designed for web application penetration testing. With features like user-agent rotation, multithreading, and…

2 years ago

PwnDoc – Streamlining Pentest Reporting For Efficient Vulnerability Management

PwnDoc is a pentest reporting application making it simple and easy to write your findings and generate a customizable Docx…

2 years ago

Bypass Fuzzer – Exploring A Powerful Tool For Testing End Point Security

This tool performs various checks via headers, path normalization, verbs, etc. to attempt to bypass ACL's or URL validation. It…

2 years ago