Exploitation Tools main menu
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local Privilege Escalation (LPE) exploits targeting…
Extract and execute a PE embedded within a PNG file using an LNK file. The PE file is encrypted using…
This took me like 4 days (+2 days for an update), but I got it working... rust core + alloc…
Pwnlook is an offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to…
In the evolving landscape of cybersecurity, understanding and mitigating threats through advanced tools is paramount. "EDRenum-BOF" emerges as a critical…
Penelope is a shell handler designed to be easy to use and intended to replace netcat when exploiting RCE vulnerabilities.…
This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is…
In the evolving landscape of cybersecurity, understanding the mechanisms behind vulnerabilities is crucial for both mitigation and responsible exploitation. This…
This is a tool for searching Exploits from some Exploit Databases. Exploits are inserted at sqlite database(go-exploitdb) can be searched…
Generate a proxy dll for arbitrary dll, while also loading a user-defined secondary dll. In the evolving landscape of software…