The toolkit has several ways it could be used, due to its modular nature, but the main feature of it…
Explore the comprehensive command-line interface (CLI) of the BlueKit toolkit designed for cybersecurity professionals. This article delves into the various…
This repository contains an exploit for the BufferOverflowNonPagedPoolNx vulnerability in HackSys Extreme Vulnerable Driver (HEVD). The exploit targets Windows 10 Version…
Protected Process Dumper Tool that support obfuscating memory dump and transferring it on remote workstations without dropping it onto the…
MemFiles is a toolkit for CobaltStrike that enables Operators to write files produced by the Beacon process into memory, rather…
This Python script generates interpreted code which creates the supplied ELF as a file in memory and executes it (without…
This new, advanced ROP framework made it debute at at DEF CON 31 with some unprecedented capabilities. ROCKET generates several…
Firstly, a folder is created in the temp directory, and the properties of the folder are opened using SHObjectProperties. To…
Dive into the world of binary exploitation with this comprehensive guide. Whether you're a beginner eager to understand stack techniques…
Pacu is an open source AWS exploitation framework created and maintained by Rhino Security Labs to assist in offensive security…