kalilinux

Dangerzone – Safely Convert Risky Documents Into Secure PDFs

Take potentially dangerous PDFs, office documents, or images and convert them to a safe PDF. Dangerzone works like this: You…

1 year ago

Nord Stream – Uncovering Secrets With A CICD Exploitation Toolkit

Nord Stream is a tool that allows you extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently supports Azure…

1 year ago

Ghidra Script Mastery – Managing And Automating With GhidraScripts For Golang

Scripts to run within Ghidra, maintained by the Trellix ARC team. Ghidra, the open-source software reverse engineering tool, is known…

1 year ago

CVE-2023-36723 – Windows Sandbox Directory Creation Vulnerability

This is PoC for arbitrary directory creation bug in Container Manager service. This PoC is not thoroughly tested so it…

1 year ago

The Elastic Container Project – Streamlining Security Research With A Quick Setup Guide

Stand up a 100% containerized Elastic stack, TLS secured, with Elasticsearch, Kibana, Fleet, and the Detection Engine all pre-configured, enabled…

1 year ago

Coerced Potato – Windows Privilege Escalation

In the realm of cybersecurity, understanding the vulnerabilities within operating systems is paramount. "Coerced Potato" delves into the intricate world…

1 year ago

G3nius Tools Sploit – Your Ultimate Guide To Advanced Penetration Testing

G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and…

1 year ago

RustHound : A Cross-Platform BloodHound Collector Tool

In the realm of cybersecurity and network reconnaissance, RustHound emerges as a versatile hero. This cross-platform BloodHound collector tool, built…

1 year ago

POSTDump – Evading Detection And Safely Dumping LSASS Memory

Another tool to perform minidump of LSASS process using few technics to avoid detection. POSTDump is the C# / .NET…

1 year ago

Mastering WificraK – Unveiling the Power of Advanced Wi-Fi Exploits

Introduction The majority of WPA2-PSK and WEP encryption attacks can be carried out using the WificraK tool. Using crunch or…

1 year ago