The RdpStrike is basically a mini project I built to dive deep into Positional Independent Code (PIC) referring to a blog post written by C5pider,…
Explore the cutting-edge capabilities of Meta Sploit Telegram (MS-TL), a powerful Telegram bot designed for remote PC control. This article…
Discover the power of Flagger, a streamlined command-line interface tool designed for cybersecurity enthusiasts and professionals alike. Crafted specifically for…
BackupCreds presents a groundbreaking method for security professionals to exploit SeTrustedCredmanAccessPrivilege, enabling the dumping of stored credentials in Windows environments.…
NTLM Relay Gat revolutionizes the approach to exploiting NTLM relay vulnerabilities by automating the use of the Impacket suite's ntlmrelayx.py…
Shelter is a completely weaponized sleep obfuscation technique that allows to fully encrypt your in-memory payload making an extensive use…
Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions. LooneyPwner is a proof-of-concept (PoC) exploit…
.-. [.-''-., | //`~\) (<| 0\0|>_ ";\ _"/ \\_ _, __\|'._/_ \ '='-, /\ \ || )_///_\>> ( '._ T…
PoC for the CVE-2023-49103 Overview This Python script is designed to efficiently process a large list of URLs to check…
Padre is a sophisticated and efficient software tool specifically engineered to leverage the inherent weaknesses in CBC mode encryption through…