Firstly, a folder is created in the temp directory, and the properties of the folder are opened using SHObjectProperties. To…
Dive into the world of binary exploitation with this comprehensive guide. Whether you're a beginner eager to understand stack techniques…
Pacu is an open source AWS exploitation framework created and maintained by Rhino Security Labs to assist in offensive security…
The RdpStrike is basically a mini project I built to dive deep into Positional Independent Code (PIC) referring to a blog post written by C5pider,…
Explore the cutting-edge capabilities of Meta Sploit Telegram (MS-TL), a powerful Telegram bot designed for remote PC control. This article…
Discover the power of Flagger, a streamlined command-line interface tool designed for cybersecurity enthusiasts and professionals alike. Crafted specifically for…
BackupCreds presents a groundbreaking method for security professionals to exploit SeTrustedCredmanAccessPrivilege, enabling the dumping of stored credentials in Windows environments.…
NTLM Relay Gat revolutionizes the approach to exploiting NTLM relay vulnerabilities by automating the use of the Impacket suite's ntlmrelayx.py…
Shelter is a completely weaponized sleep obfuscation technique that allows to fully encrypt your in-memory payload making an extensive use…
Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions. LooneyPwner is a proof-of-concept (PoC) exploit…