Exploitation Tools

DCOMUploadExec : A Tool For Lateral Movement Exploits Using IMsiServer

DCOMUploadExec is a proof-of-concept (PoC) tool designed to exploit the Distributed Component Object Model (DCOM) for lateral movement within a…

10 months ago

CognitoHunter : A Comprehensive AWS Cognito Analysis Toolkit

CognitoHunter is a specialized toolkit designed for security researchers and penetration testers to analyze and exploit vulnerabilities in AWS Cognito…

10 months ago

Exploring The Tools And Functions Of “how2heap”

how2heap is a repository designed to teach and demonstrate various heap exploitation techniques. It provides a hands-on approach to understanding…

10 months ago

Understanding CVE-2024-12084 And Its Exploitation

CVE-2024-12084 is a critical vulnerability in the widely-used Rsync tool, identified as a heap-based buffer overflow. This flaw arises from…

10 months ago

Relocatable : A Tool For Position Independent Code

Relocatable is an innovative tool designed to simplify the creation of Position Independent Code (PIC) in C. This tool enables…

10 months ago

BOF WinRM Client : Advancing Stealth And Efficiency In Remote System Management

The BOF WinRM Client is a Beacon Object File (BOF) extension for Cobalt Strike that provides a lightweight and stealthy…

10 months ago

Understanding And Utilizing The Tomcat – CVE-2024-50379 Proof-of-Concept (PoC)

The Tomcat-CVE-2024-50379-PoC is a proof-of-concept tool designed to demonstrate the exploitation of a critical vulnerability in Apache Tomcat, identified as…

10 months ago

CVE-2024-55591 : Fortinet FortiOS Authentication Bypass Vulnerability

CVE-2024-55591 is a critical authentication bypass vulnerability affecting Fortinet's FortiOS and FortiProxy systems. This flaw, rated with a CVSS score…

10 months ago

Draugr : Advanced Tools For Synthetic Stack Frame Manipulation

The Draugr toolset provides a robust framework for performing synthetic stack frame manipulation, primarily designed to bypass modern Endpoint Detection…

10 months ago

Awesome-Red-Team-Operation : A Comprehensive Toolkit For Advanced Cybersecurity

The "Awesome-Red-Team-Operation" repository is a comprehensive collection of tools designed to support red team operations, penetration testing, and cybersecurity assessments.…

10 months ago