This is a cheatsheet of tools and commands that I use to pentest Active Directory. It includes Windows, Impacket and…
To contribute your work to the project you need to create a pull request on the Github where it is…
To add an exploit one has to go through a similar process as with the hardware profile, but in the…
The toolkit has several ways it could be used, due to its modular nature, but the main feature of it…
Explore the comprehensive command-line interface (CLI) of the BlueKit toolkit designed for cybersecurity professionals. This article delves into the various…
This repository contains an exploit for the BufferOverflowNonPagedPoolNx vulnerability in HackSys Extreme Vulnerable Driver (HEVD). The exploit targets Windows 10 Version…
Protected Process Dumper Tool that support obfuscating memory dump and transferring it on remote workstations without dropping it onto the…
MemFiles is a toolkit for CobaltStrike that enables Operators to write files produced by the Beacon process into memory, rather…
This Python script generates interpreted code which creates the supplied ELF as a file in memory and executes it (without…
This new, advanced ROP framework made it debute at at DEF CON 31 with some unprecedented capabilities. ROCKET generates several…