Exploitation Tools

Exploitation Tools main menu

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVMollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable logic into complex state-driven structures.…

2 days ago
MODeflattener – Miasm’s OLLVM DeflattenerMODeflattener – Miasm’s OLLVM Deflattener

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static analysis techniques. Developed using Miasm's…

3 days ago
Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary code by exploiting improper side-effect…

3 days ago
Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript InternalsChrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides foundational insights into browser internals…

3 days ago
IngressNightmare-POCs : Understanding The Vulnerability Exploitation FlowIngressNightmare-POCs : Understanding The Vulnerability Exploitation Flow

IngressNightmare-POCs : Understanding The Vulnerability Exploitation Flow

The "IngressNightmare" vulnerabilities, disclosed in March 2025, represent a critical set of security issues affecting the NGINX Ingress Controller for…

6 days ago
Awesome-Redteam : A Comprehensive Guide To Advanced Red Teaming Tools And TechniquesAwesome-Redteam : A Comprehensive Guide To Advanced Red Teaming Tools And Techniques

Awesome-Redteam : A Comprehensive Guide To Advanced Red Teaming Tools And Techniques

The Awesome-Redteam repository is a comprehensive collection of tools and resources designed for red teaming and offensive security. It provides…

1 week ago
ByDeF : Mastering The Art Of Antivirus Evasion For Penetration TestingByDeF : Mastering The Art Of Antivirus Evasion For Penetration Testing

ByDeF : Mastering The Art Of Antivirus Evasion For Penetration Testing

ByDeF is a tool designed to generate an undetectable Portable Executable (PE) file, specifically a .exe file, that can bypass…

1 week ago
OSCE³ and OSEE Study Guide : Understanding Key Tools And FunctionsOSCE³ and OSEE Study Guide : Understanding Key Tools And Functions

OSCE³ and OSEE Study Guide : Understanding Key Tools And Functions

The OSCE³ (Offensive Security Certified Expert 3) and OSEE (Offensive Security Exploitation Expert) certifications are advanced qualifications in the field…

1 week ago
Kernel Callbacks Removal : Bypassing EDR DetectionsKernel Callbacks Removal : Bypassing EDR Detections

Kernel Callbacks Removal : Bypassing EDR Detections

Kernel callbacks are essential components used by Endpoint Detection and Response (EDR) systems to monitor system events, such as process…

1 week ago
Remote Lua Loader : Mastering PS4 And PS5 Exploits With Advanced ScriptingRemote Lua Loader : Mastering PS4 And PS5 Exploits With Advanced Scripting

Remote Lua Loader : Mastering PS4 And PS5 Exploits With Advanced Scripting

The Remote Lua Loader is a tool designed to exploit vulnerabilities in games built with the Artemis game engine, which…

2 weeks ago