There are a number of excellent tutorials. I recommend this one: Basically, you are going to create a .htaccess file…
Pwnlook is an offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to…
In the evolving landscape of cybersecurity, understanding and mitigating threats through advanced tools is paramount. "EDRenum-BOF" emerges as a critical…
Penelope is a shell handler designed to be easy to use and intended to replace netcat when exploiting RCE vulnerabilities.…
Vulnhuntr leverages the power of LLMs to automatically create and analyze entire code call chains starting from remote user input…
This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is…
In the evolving landscape of cybersecurity, understanding the mechanisms behind vulnerabilities is crucial for both mitigation and responsible exploitation. This…
Arena-Hard-Auto-v0.1 (See Paper) is an automatic evaluation tool for instruction-tuned LLMs. It contains 500 challenging user queries sourced from Chatbot…
This is a tool for searching Exploits from some Exploit Databases. Exploits are inserted at sqlite database(go-exploitdb) can be searched…
A list of awesome academic researches and industrial materials about Large Language Model (LLM) and Artificial Intelligence for IT Operations…