kalilinuxtools

LiteSpeed Cache Privilege Escalation PoC – CVE-2024-28000

This repository contains a Proof of Concept (PoC) script for exploiting a privilege escalation vulnerability in the LiteSpeed Cache WordPress…

2 months ago

MagiskEoP – Unpacking The Silent Root Exploit In Magisk

This is an exploit for a vulnerability in Magisk app that allows a local app to silently gain root access…

2 months ago

VeilTransfer – Mastering Data Exfiltration Simulation For Enhanced Cybersecurity

VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exfiltration…

2 months ago

Deep-HLR : Harnessing The Power Of Defastra For Comprehensive Phone Number Analysis

This script uses the Defastra Deep Phone HLR Check API, aiming to be a tool in fraud prevention and osint…

2 months ago

Windows Downdate – Mastering The Art Of OS Downgrade Attacks

A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities. Presented at Black Hat…

2 months ago

3proxy – Features, Installation, And Usage Guide

The versatile capabilities of 3proxy, a robust and lightweight proxy server designed for a variety of network tasks. From basic…

2 months ago

JYso – A Comprehensive Guide To Advanced JNDI And Serialization Exploits

JYso is a tool that can be used as both ysoserial and JNDIExploit. It also has bypass functions of multiple JNDI…

2 months ago

Findsploit – The Ultimate Tool For Exploit Discovery And Management

Finsploit is a simple bash script to quickly and easily search both local and online exploit databases. This repository also…

2 months ago

How To Install/Run – Streamlining OSINT Workflows For Enhanced Capabilities

git clone https://github.com/AnonCatalyst/Odinova && cd Odinova pip install -r requirements.txt --break-system-packages python3 odinova.py -- Support Server Help us grow our discord server…

2 months ago

CVE-2024-38856 : A Practical Guide To Leveraging Bash And Nuclei

In this comprehensive guide, we delve into the intricacies of CVE-2024-38856, a critical vulnerability that has surfaced in cybersecurity discussions.…

2 months ago