kalilinuxtools

Process Stomping: Advanced Technique for Executing Shellcode in Targeted Executable Sections

Cybersecurity is a field that is always changing, and new techniques are always being made to improve both offensive and…

10 months ago

CLZero: Fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors

CLZero is a strong program that helps security experts and penetration testers find and use attack vectors for HTTP/1.1 CL.0…

10 months ago

KnowsMore: Active Directory and Password Analysis Tool

KnowsMore is a powerful program made for people who work in network security and Active Directory control. There are many…

10 months ago

B(l)utter: A Tool for Reverse Engineering Flutter Mobile Applications

Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT Runtime Currently the application supports only Android libapp.so (arm64 only).…

10 months ago

GitAlerts: Enhancing GitHub Security and Monitoring for Organization Repositories

GitHub has become an important tool for version control and project management in the ever-changing world of software development and…

10 months ago

CVE-2023-6553 Exploit V2

The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7…

10 months ago

ICSpector: Microsoft’s Open-Source ICS Forensics Framework

Microsoft ICS Forensics Tools framework is an open-source forensics framework that enables the analysis of Industrial PLC metadata and project…

10 months ago

Atlassian Companion RCE Vulnerability Proof of Concept (CVE-2023-22524)

Atlassian Companion for macOS has a serious remote code execution vulnerability that was just found. It is called CVE-2023-22524. This…

10 months ago

ADOKit: Azure DevOps Services Attack Toolkit

Azure DevOps Services Attack Toolkit - ADOKit is a toolkit that can be used to attack Azure DevOps Services by…

10 months ago

CreateToken: Exploiting ZwCreateToken() for SYSTEM Token

In the realm of cybersecurity, understanding and exploiting Windows APIs is pivotal for both defenders and attackers. In this article,…

10 months ago