Exploitation Tools

Windows Downdate – Mastering The Art Of OS Downgrade Attacks

A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities. Presented at Black Hat…

10 months ago

3proxy – Features, Installation, And Usage Guide

The versatile capabilities of 3proxy, a robust and lightweight proxy server designed for a variety of network tasks. From basic…

10 months ago

JYso – A Comprehensive Guide To Advanced JNDI And Serialization Exploits

JYso is a tool that can be used as both ysoserial and JNDIExploit. It also has bypass functions of multiple JNDI…

10 months ago

Findsploit – The Ultimate Tool For Exploit Discovery And Management

Finsploit is a simple bash script to quickly and easily search both local and online exploit databases. This repository also…

11 months ago

CVE-2024-38077-EXP : In-Depth Analysis And Exploitation Of A Windows Server 2025 Vulnerability

We delve into CVE-2024-38077, a critical security vulnerability identified in Windows Server 2025. This flaw, if exploited, could allow unauthorized…

11 months ago

TrickDump – Evading Detection With Advanced Memory Dump Techniques

TrickDump dumps the lsass process without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the…

11 months ago

DriverJack – Exploiting NTFS Techniques For Covert Driver Loading

DriverJack is a tool designed to load a vulnerable driver by abusing lesser-known NTFS techniques. These method bypass the registration of…

11 months ago

SCCM HTTP Looter – A Deep Dive Into Exploiting Microsoft SCCM via HTTP

SCCM distribution points (DPs) are the servers used by Microsoft SCCM to host all the files used in software installs,…

11 months ago

Metasploit for Penetration Testing and Exploitation – 2024

Metasploit is a powerful and widely used framework for penetration testing and exploitation. It provides security professionals with tools to…

11 months ago

Pentesting Active Directory – A Comprehensive Guide To Tools, Techniques, And Commands

This is a cheatsheet of tools and commands that I use to pentest Active Directory. It includes Windows, Impacket and…

11 months ago