Instagram
Linkedin
Twitter
KaliLinux
Cybersecurity
Apple
Geeks
Linux
Applications
More
Search
Kali Linux Tutorials
KaliLinux
Cybersecurity
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Cyber security
SMM : From Social Media To System Management Mode
Applications
MCP Server For Obsidian : Enhancing AI Integration
Cyber security
wa-tunnel – TCP Tunneling Through Whatsapp
Applications
Deepfake Apps : How They Function And Their Applications
Apple
Apple
JBDev : A Tool For Jailbreak And TrollStore Development
Apple
Nyxian : A Low-Level Scripting Language For iOS
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
Apple
IPATool : A Comprehensive Guide To Managing iOS Apps
Exploitation Tools
Trigon : A Revolutionary Kernel Exploit For iOS
Geeks
Linux
Cyber security
Bincrypter : Enhancing Linux Binary Security through Runtime Encryption And Obfuscation
Applications
AMDVLK : The Power Of Vulkan On AMD GPUs For Linux
Cyber security
eBPF File Creation Blocker : Enhancing Linux Security
Applications
Zellij : A Versatile Terminal Multiplexer
Linux
Starship : Revolutionizing Terminal Experiences Across Shells
Applications
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Applications
Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs
Applications
MCP Server For Obsidian : Enhancing AI Integration
Applications
Deepfake Apps : How They Function And Their Applications
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
More
Android
Apple
Applications
Blog
Cyber security
Database Assessment
Exploitation Tools
Forensics
Hacking Tools
Information Gathering
Kali Linux
Linux
Malware
Password Attacks
Pentesting Tools
Phishing
Post Exploitation
Security Hacker
Sniffing/Spoofing
software
Stress Testing
TECH
Tech today
Tutorials
VPN
Vulnerability Analysis
Web Application Analysis
Windows
Wireless Attacks
Latest
Latest
Featured posts
Most popular
7 days popular
By review score
Random
ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM
Varshini
-
April 1, 2025
0
MODeflattener – Miasm’s OLLVM Deflattener
Varshini
-
March 31, 2025
0
Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463
Varshini
-
March 31, 2025
0
Exploitation Tools
Home
Exploitation Tools
Page 12
Exploitation Tools main menu
Exploitation Tools
CLI Usage : Command-Line Mastery With The BlueKit Toolkit
Varshini
-
July 22, 2024
0
Exploitation Tools
HackSys Extreme Vulnerable Driver (HEVD) – BufferOverflowNonPagedPoolNx Exploit
Varshini
-
July 10, 2024
0
Exploitation Tools
PPLBlade: Advanced Memory Dumping and Obfuscation Tool
Varshini
-
July 10, 2024
0
Exploitation Tools
MemFiles : Enhancing CobaltStrike With In-Memory File Management
Varshini
-
July 9, 2024
0
Exploitation Tools
Fileless ELF Execution – Running Binaries In Memory With FEE
Varshini
-
July 8, 2024
0
Exploitation Tools
ROP ROCKET – The Next Evolution Of ROP Chain Generation
Varshini
-
July 2, 2024
0
Exploitation Tools
IconJector – Exploiting Windows Explorer With DLL Injection Through Icon Changes
Varshini
-
June 26, 2024
0
Exploitation Tools
Binary Exploitation Notes – Techniques, Resources, And More
Varshini
-
June 26, 2024
0
Exploitation Tools
Pacu – A Comprehensive Guide To The AWS Exploitation Framework
Varshini
-
June 21, 2024
0
Exploitation Tools
RdpStrike – Harnessing PIC And Hardware Breakpoints For Credential Extraction
Varshini
-
June 17, 2024
0
1
...
11
12
13
...
15
Page 12 of 15
APPLICATIONS
MSI Dump : A Tool That Analyzes Malicious MSI Installation
R K
-
April 26, 2023
Registry-Recon : Cobalt Strike Aggressor Script That Performs System/AV/EDR Recon
R K
-
January 12, 2022
BlackArch Linux – Penetration Testing Distribution
R K
-
September 12, 2019
Watcher : Open Source Cybersecurity Threat Hunting Platform
R K
-
December 28, 2020
HOT NEWS
DefenderCheck : Identifies The Bytes That Microsoft Defender Flags On
R K
-
April 12, 2021
0
Kali Linux
DefenderCheck quick tool to help make evasion work a little bit easier. Takes a binary as input and splits it until it pinpoints that...