Exploitation Tools

Flagger – A Powerful CLI Tool For Crafting CTF Exploits

Discover the power of Flagger, a streamlined command-line interface tool designed for cybersecurity enthusiasts and professionals alike. Crafted specifically for…

10 months ago

BackupCreds – Mastering Credential Dumping In Windows

BackupCreds presents a groundbreaking method for security professionals to exploit SeTrustedCredmanAccessPrivilege, enabling the dumping of stored credentials in Windows environments.…

11 months ago

NTLM Relay Gat – Automating Exploitation Of NTLM Relay Vulnerabilities

NTLM Relay Gat revolutionizes the approach to exploiting NTLM relay vulnerabilities by automating the use of the Impacket suite's ntlmrelayx.py…

11 months ago

Shelter : Mastering In-Memory Payload Encryption With Advanced ROP Techniques

Shelter is a completely weaponized sleep obfuscation technique that allows to fully encrypt your in-memory payload making an extensive use…

11 months ago

LooneyPwner: Exploiting the glibc ‘Looney Tunables’ Flaw in Linux

Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions. LooneyPwner is a proof-of-concept (PoC) exploit…

1 year ago

Aladdin: Advanced .NET Payload Generation and Execution Techniques

.-. [.-''-., | //`~\) (<| 0\0|>_ ";\ _"/ \\_ _, __\|'._/_ \ '='-, /\ \ || )_///_\>> ( '._ T…

1 year ago

Exploiting CVE-2023-49103: A Python Script for Rapid phpinfo() Detection

PoC for the CVE-2023-49103 Overview This Python script is designed to efficiently process a large list of URLs to check…

1 year ago

Padre: A Powerful Tool for Exploiting Padding Oracle Attacks

Padre is a sophisticated and efficient software tool specifically engineered to leverage the inherent weaknesses in CBC mode encryption through…

1 year ago

LightsOut: Disabling AMSI & ETW with an Obfuscated DLL

LightsOut will generate an obfuscated DLL that will disable AMSI & ETW while trying to evade AV. This is done…

1 year ago

Nord Stream – Uncovering Secrets With A CICD Exploitation Toolkit

Nord Stream is a tool that allows you extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently supports Azure…

1 year ago