kalilinux

Frown – An Instrumentation Challenge : Navigating The Setup And Solutions

In the world of cybersecurity and ethical hacking, challenges often serve as valuable training grounds for aspiring professionals. "Frown –…

8 months ago

Linux Kernel CVE-2023-6546 : Unveiling A Critical Vulnerability

This is a custom exploit which targets Ubuntu 18.04+20.04 LTS/Centos 8/RHEL 8 to attain root privileges via arbitrary kernel code…

8 months ago

GraphStrike – Empowering Cobalt Strike With Microsoft Graph API Integration

GraphStrike is a suite of tools that enables Cobalt Strike's HTTPS Beacon to use Microsoft Graph API for C2 communications. All Beacon…

8 months ago

AI Exploits – Vulnerabilities And Threats In Machine Learning Infrastructure

The AI world has a security problem and it's not just in the inputs given to LLMs such as ChatGPT.…

8 months ago

EchoDrv – Unveiling Kernel Vulnerabilities In ECHOAC Anti-Cheat Driver echo_driver.sys

In the realm of cybersecurity, the relentless battle between attackers and defenders rages on. Enter EchoDrv, a potent tool that…

8 months ago

Ghost – Unmasking The Intricacies Of A Remote Access Trojan

Ghost is a light RAT that gives the server/attacker full remote access to the user's command-line interpreter (cmd.exe). They are allowed to execute…

8 months ago

LOLSpoof – A Clever Technique To Evade Command Line Detection And Maintain OPSEC

LOLSpoof is a an interactive shell program that automatically spoof the command line arguments of the spawned process. Just call…

8 months ago

FalconHound – Empowering Blue Teams With Automated BloodHound Integration

FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more…

8 months ago

Uscrapper 2.0 – Unleashing The Power Of OSINT Web Scraping For Data Extraction

Introducing Uscrapper 2.0, A powerfull OSINT webscrapper that allows users to extract various personal information from a website. It leverages…

8 months ago

GSSAPI-Abuse : Leveraging Kerberos Stacks For Authentication Abuse

gssapi-abuse was released as part of my DEF CON 31 talk. A full write up on the abuse vector can…

8 months ago