Exploitation Tools main menu
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable logic into complex state-driven structures.…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static analysis techniques. Developed using Miasm's…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary code by exploiting improper side-effect…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides foundational insights into browser internals…
The "IngressNightmare" vulnerabilities, disclosed in March 2025, represent a critical set of security issues affecting the NGINX Ingress Controller for…
The Awesome-Redteam repository is a comprehensive collection of tools and resources designed for red teaming and offensive security. It provides…
ByDeF is a tool designed to generate an undetectable Portable Executable (PE) file, specifically a .exe file, that can bypass…
The OSCE³ (Offensive Security Certified Expert 3) and OSEE (Offensive Security Exploitation Expert) certifications are advanced qualifications in the field…
Kernel callbacks are essential components used by Endpoint Detection and Response (EDR) systems to monitor system events, such as process…
The Remote Lua Loader is a tool designed to exploit vulnerabilities in games built with the Artemis game engine, which…