kalilinux

Java Deserialization Cheat Sheet – Detecting And Exploiting Vulnerabilities

A cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries. Please, use #javadeser hash…

9 months ago

RedELK – Enhancing Red Team Operations And Blue Team Detection Through Centralized SIEM

Short: a Red Team's SIEM. Longer: a Red Team's SIEM that serves two main goals: Enhanced usability and overview for…

9 months ago

SharpTerminator – A Guide To Automating AV/EDR Disruption With C# Port

C# port of ZeroMemoryEx's Terminator, so all hail goes to him. Usage You can download the driver from a remote…

9 months ago

RedELK Server – DeploymentEssential Configuration Variables Overview

We delve into the process of setting up a RedELK server, focusing on the critical configuration variables required for successful…

9 months ago

RedELK-Client : Deploying Cybersecurity Monitoring With Ansible

The RedELK client components using Ansible, a powerful automation tool that streamlines the installation and management of cybersecurity monitoring systems.…

9 months ago

Crawl4AI – The Future Of Asynchronous Web Crawling For AI

Crawl4AI simplifies asynchronous web crawling and data extraction, making it accessible for large language models (LLMs) and AI applications. Looking…

9 months ago

OXO Scan Orchestration Engine – A Comprehensive Guide To Scalable Security Assessments

OXO is a security scanning framework built for modularity, scalability and simplicity. OXO Engine combines specialized tools to work cohesively…

9 months ago

Nullinux – The Comprehensive SMB Enumeration Tool For Penetration Testing

Nullinux is an internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares,…

9 months ago

MANSPIDER – Advanced SMB Crawling For Sensitive Data Detection

textract, one of manspider's upstream dependencies, is no longer being updated. For this reason, you may run into problems when…

9 months ago

EDR-Antivirus-Bypass-To-Gain-Shell-Access

This repository contains a proof-of-concept (PoC) for bypassing EDR and antivirus solutions using a memory injection technique. The code executes…

9 months ago