kalilinuxtools

BypassAV : Techniques To Evade Antivirus And EDR Systems

BypassAV refers to the collection of techniques and tools used to bypass antivirus (AV) and Endpoint Detection and Response (EDR)…

10 months ago

ComDotNetExploit : Exploiting Windows Protected Process Light (PPL)

ComDotNetExploit is a Proof of Concept (PoC) tool designed to demonstrate the exploitation of Windows Protected Process Light (PPL) by…

10 months ago

Trigon : A Revolutionary Kernel Exploit For iOS

Trigon is a sophisticated deterministic kernel exploit targeting Apple’s iOS devices, leveraging the CVE-2023-32434 vulnerability. This exploit, developed by Alfie…

10 months ago

Bug Bounty Report Templates : Enhancing Efficiency In Vulnerability Reporting

Bug bounty report templates are essential tools for streamlining the process of documenting vulnerabilities. They ensure that hackers provide clear,…

10 months ago

FullBypass : A Tool For AMSI And PowerShell CLM Bypass

FullBypass is a tool designed to circumvent Microsoft's Antimalware Scan Interface (AMSI) and PowerShell's Constrained Language Mode (CLM). By doing…

10 months ago

Carseat : A Python Implementation Of Seatbelt

Carseat is a Python-based tool that replicates the functionality of the well-known security auditing tool, Seatbelt. It includes nearly all…

10 months ago

Pyda : A Tool For Dynamic Binary Analysis

Pyda is an innovative tool designed to simplify dynamic binary analysis by allowing developers to write analysis tools in Python.…

10 months ago

AMDVLK : The Power Of Vulkan On AMD GPUs For Linux

The AMD Open Source Driver for Vulkan® (AMDVLK) is a powerful, open-source Vulkan driver developed by AMD for Radeon™ graphics…

10 months ago

Atomic Red Team : Mastering Threat Simulations For Advanced Security Testing

The Atomic Red Team is an open-source framework designed to help security teams emulate adversarial tactics and techniques in alignment…

10 months ago

SCCMHunter : A Comprehensive Tool For SCCM Asset Exploitation

SCCMHunter is a Python-based post-exploitation tool designed for security professionals to identify, profile, and exploit System Center Configuration Manager (SCCM)…

10 months ago