Shelter is a completely weaponized sleep obfuscation technique that allows to fully encrypt your in-memory payload making an extensive use…
Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions. LooneyPwner is a proof-of-concept (PoC) exploit…
.-. [.-''-., | //`~\) (<| 0\0|>_ ";\ _"/ \\_ _, __\|'._/_ \ '='-, /\ \ || )_///_\>> ( '._ T…
PoC for the CVE-2023-49103 Overview This Python script is designed to efficiently process a large list of URLs to check…
Padre is a sophisticated and efficient software tool specifically engineered to leverage the inherent weaknesses in CBC mode encryption through…
LightsOut will generate an obfuscated DLL that will disable AMSI & ETW while trying to evade AV. This is done…
Nord Stream is a tool that allows you extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently supports Azure…
A groundbreaking C2 framework designed for modern cybersecurity challenges. With its advanced TCP & HoaxShell capabilities, Villain is set to…
"Mshikaki - kebab (skewered meat, especially beef)" yum yum. In the realm of cybersecurity, stealth and efficiency are paramount. Enter…
In the ever-evolving game of cybersecurity, encrypted shellcode injection emerges as a formidable method to sidestep defenses. This article unveils…