Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service) memory, often needed in penetration…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation while leveraging Rust’s safety and…
Extract and execute a PE embedded within a PNG file using an LNK file. The PE file is encrypted using…
Embark on the journey of becoming a certified Red Team professional with our definitive guide. This article provides a comprehensive…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within the Chromium web browser which…
This took me like 4 days (+2 days for an update), but I got it working... rust core + alloc…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is a 100% custom-built C# LDAP…
There are a number of excellent tutorials. I recommend this one: Basically, you are going to create a .htaccess file…
Pwnlook is an offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to…
In the evolving landscape of cybersecurity, understanding and mitigating threats through advanced tools is paramount. "EDRenum-BOF" emerges as a critical…