Exploitation Tools

CVE-2024-38077-EXP : In-Depth Analysis And Exploitation Of A Windows Server 2025 Vulnerability

We delve into CVE-2024-38077, a critical security vulnerability identified in Windows Server 2025. This flaw, if exploited, could allow unauthorized…

6 months ago

TrickDump – Evading Detection With Advanced Memory Dump Techniques

TrickDump dumps the lsass process without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the…

6 months ago

DriverJack – Exploiting NTFS Techniques For Covert Driver Loading

DriverJack is a tool designed to load a vulnerable driver by abusing lesser-known NTFS techniques. These method bypass the registration of…

6 months ago

SCCM HTTP Looter – A Deep Dive Into Exploiting Microsoft SCCM via HTTP

SCCM distribution points (DPs) are the servers used by Microsoft SCCM to host all the files used in software installs,…

6 months ago

Metasploit for Penetration Testing and Exploitation – 2024

Metasploit is a powerful and widely used framework for penetration testing and exploitation. It provides security professionals with tools to…

6 months ago

Pentesting Active Directory – A Comprehensive Guide To Tools, Techniques, And Commands

This is a cheatsheet of tools and commands that I use to pentest Active Directory. It includes Windows, Impacket and…

6 months ago

Contributing Your Work – A Guide To Submitting Exploits On GitHub

To contribute your work to the project you need to create a pull request on the Github where it is…

6 months ago

Adding An Exploit – How To Integrate And Manage New Exploits In BlueToolkit

To add an exploit one has to go through a similar process as with the hardware profile, but in the…

6 months ago

Workflow – Comprehensive Guide To Using BlueToolkit For Bluetooth Vulnerability Testing

The toolkit has several ways it could be used, due to its modular nature, but the main feature of it…

6 months ago

CLI Usage : Command-Line Mastery With The BlueKit Toolkit

Explore the comprehensive command-line interface (CLI) of the BlueKit toolkit designed for cybersecurity professionals. This article delves into the various…

6 months ago