Exploitation Tools

Draugr : Advanced Tools For Synthetic Stack Frame Manipulation

The Draugr toolset provides a robust framework for performing synthetic stack frame manipulation, primarily designed to bypass modern Endpoint Detection…

3 weeks ago

Awesome-Red-Team-Operation : A Comprehensive Toolkit For Advanced Cybersecurity

The "Awesome-Red-Team-Operation" repository is a comprehensive collection of tools designed to support red team operations, penetration testing, and cybersecurity assessments.…

3 weeks ago

GoRedOps : A Golang Arsenal For Red Teamers And Security Professionals

GoRedOps is a comprehensive collection of Golang-based projects tailored for red teamers and offensive security professionals. This repository offers a…

3 weeks ago

Krueger : Exploiting Windows Defender To Neutralize EDR Systems

Krueger is a Proof of Concept (PoC) .NET post-exploitation tool designed to disable Endpoint Detection and Response (EDR) systems during…

3 weeks ago

StoneKeeper C2 : A Research-Oriented Command-And-Control Framework For EDR Evasion

The StoneKeeper C2 is an experimental command-and-control (C2) framework designed for research purposes, focusing on modern Windows malware tactics and…

3 weeks ago

Silent Execution Of cmd.exe With Redirected STDERR And STDOUT

The ability to execute commands silently using cmd.exe while redirecting both standard output (STDOUT) and standard error (STDERR) is a…

3 weeks ago

Process Inject Kit : Elevating Penetration Testing With Advanced Injection Capabilities

The Process Inject Kit is a specialized toolkit designed to enhance and customize process injection techniques in Cobalt Strike, a…

3 weeks ago

AD-CS-Forest-Exploiter : Mastering Security Through PowerShell For AD CS Misconfiguration

ADCFFS is a PowerShell script that can be used to exploit the AD CS container misconfiguration allowing privilege escalation and…

1 month ago

RWX_MEMORY_HUNT_AND_INJECTION_DV : Exploiting OneDrive.exe To Inject Shellcode Without New RWX Allocations

Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region. This technique…

1 month ago

Fuxploider : Automating File Upload Vulnerability Exploitation

Fuxploider is an open source penetration testing tool that automates the process of detecting and exploiting file upload forms flaws.…

2 months ago