Leaked Windows processes handles identification tool. Useful for identify new LPE vulnerabilities during a pentest or simply as a new research process. Currently supports exploiting (autopwn) procesess leaked handles spawning a new arbitrary process (cmd.exe default).
LHF identifies in realtime inherited handles and gives the researcher explotability tips
Presented at rootedcon 2022 https://www.rootedcon.com/ponentes-rooted2022/.
Presentation -> Presentation/Exploiting Leaked Handles for LPE.pdf
Your malware's favorite sandbox - where red teamers come to bury their payloads. A sandbox…
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new…
This article delves into our comprehensive training program designed to teach you the intricacies of…
BloodHound.py is a Python based ingestor for BloodHound, based on Impacket. The code in this…
In 2025 I wanted to try something new. In addition to a traditional 100 days…
presenterm lets you create presentations in markdown format and run them from your terminal, with…