Exploitation Tools

EDRenum-BOF : Compiling Insights On Endpoint Detection And ResponseEDRenum-BOF : Compiling Insights On Endpoint Detection And Response

EDRenum-BOF : Compiling Insights On Endpoint Detection And Response

In the evolving landscape of cybersecurity, understanding and mitigating threats through advanced tools is paramount. "EDRenum-BOF" emerges as a critical…

3 months ago
Penelope – A Versatile Shell Handler For Exploiting RCE VulnerabilitiesPenelope – A Versatile Shell Handler For Exploiting RCE Vulnerabilities

Penelope – A Versatile Shell Handler For Exploiting RCE Vulnerabilities

Penelope is a shell handler designed to be easy to use and intended to replace netcat when exploiting RCE vulnerabilities.…

3 months ago
LsassReflectDumping – A Deep Dive Into Secure Credential Extraction TechniquesLsassReflectDumping – A Deep Dive Into Secure Credential Extraction Techniques

LsassReflectDumping – A Deep Dive Into Secure Credential Extraction Techniques

This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is…

3 months ago
CVE-2024-30090 : LPE Proof Of Concept DetailedCVE-2024-30090 : LPE Proof Of Concept Detailed

CVE-2024-30090 : LPE Proof Of Concept Detailed

In the evolving landscape of cybersecurity, understanding the mechanisms behind vulnerabilities is crucial for both mitigation and responsible exploitation. This…

3 months ago
go-exploitdb : A Comprehensive Guide To Managing Exploit Databasesgo-exploitdb : A Comprehensive Guide To Managing Exploit Databases

go-exploitdb : A Comprehensive Guide To Managing Exploit Databases

This is a tool for searching Exploits from some Exploit Databases. Exploits are inserted at sqlite database(go-exploitdb) can be searched…

3 months ago
DLL Proxy Generator – Harnessing Advanced Proxy CapabilitiesDLL Proxy Generator – Harnessing Advanced Proxy Capabilities

DLL Proxy Generator – Harnessing Advanced Proxy Capabilities

Generate a proxy dll for arbitrary dll, while also loading a user-defined secondary dll. In the evolving landscape of software…

3 months ago
DLL Universal Patcher – A Comprehensive Guide To Advanced Binary PatchingDLL Universal Patcher – A Comprehensive Guide To Advanced Binary Patching

DLL Universal Patcher – A Comprehensive Guide To Advanced Binary Patching

DLL Universal Patcher is a flexible and convenient code patcher that doesn't touch the files on disk. It can be…

3 months ago
RustiveDump : A Rust-Based Tool For Efficient Memory Dumping Of lsass.exeRustiveDump : A Rust-Based Tool For Efficient Memory Dumping Of lsass.exe

RustiveDump : A Rust-Based Tool For Efficient Memory Dumping Of lsass.exe

RustiveDump is a Rust-based tool designed to dump the memory of the lsass.exe process using only NT system calls. It…

3 months ago
Java Deserialization Cheat Sheet – Detecting And Exploiting VulnerabilitiesJava Deserialization Cheat Sheet – Detecting And Exploiting Vulnerabilities

Java Deserialization Cheat Sheet – Detecting And Exploiting Vulnerabilities

A cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries. Please, use #javadeser hash…

3 months ago
SharpTerminator – A Guide To Automating AV/EDR Disruption With C# PortSharpTerminator – A Guide To Automating AV/EDR Disruption With C# Port

SharpTerminator – A Guide To Automating AV/EDR Disruption With C# Port

C# port of ZeroMemoryEx's Terminator, so all hail goes to him. Usage You can download the driver from a remote…

3 months ago