Exploitation Tools

Fileless ELF Execution – Running Binaries In Memory With FEE

This Python script generates interpreted code which creates the supplied ELF as a file in memory and executes it (without…

8 months ago

ROP ROCKET – The Next Evolution Of ROP Chain Generation

This new, advanced ROP framework made it debute at at DEF CON 31 with some unprecedented capabilities. ROCKET generates several…

8 months ago

IconJector – Exploiting Windows Explorer With DLL Injection Through Icon Changes

Firstly, a folder is created in the temp directory, and the properties of the folder are opened using SHObjectProperties. To…

8 months ago

Binary Exploitation Notes – Techniques, Resources, And More

Dive into the world of binary exploitation with this comprehensive guide. Whether you're a beginner eager to understand stack techniques…

8 months ago

Pacu – A Comprehensive Guide To The AWS Exploitation Framework

Pacu is an open source AWS exploitation framework created and maintained by Rhino Security Labs to assist in offensive security…

8 months ago

RdpStrike – Harnessing PIC And Hardware Breakpoints For Credential Extraction

The RdpStrike is basically a mini project I built to dive deep into Positional Independent Code (PIC) referring to a blog post written by C5pider,…

8 months ago

Meta Sploit Telegram (MS-TL) : Unleashing Remote Control Capabilities Through Telegram

Explore the cutting-edge capabilities of Meta Sploit Telegram (MS-TL), a powerful Telegram bot designed for remote PC control. This article…

10 months ago

Flagger – A Powerful CLI Tool For Crafting CTF Exploits

Discover the power of Flagger, a streamlined command-line interface tool designed for cybersecurity enthusiasts and professionals alike. Crafted specifically for…

11 months ago

BackupCreds – Mastering Credential Dumping In Windows

BackupCreds presents a groundbreaking method for security professionals to exploit SeTrustedCredmanAccessPrivilege, enabling the dumping of stored credentials in Windows environments.…

12 months ago

NTLM Relay Gat – Automating Exploitation Of NTLM Relay Vulnerabilities

NTLM Relay Gat revolutionizes the approach to exploiting NTLM relay vulnerabilities by automating the use of the Impacket suite's ntlmrelayx.py…

12 months ago