kalilinuxtools

Valid8Proxy: Streamlining Proxy Management for Web Scraping and Network Security

Valid8Proxy is a versatile and user-friendly tool designed for fetching, validating, and storing working proxies. Whether you need proxies for…

1 year ago

CATSploit: Revolutionizing Automated Penetration Testing with Cyber Attack Techniques Scoring (CATS) Method

CATSploit is an automated penetration testing tool using Cyber Attack Techniques Scoring (CATS) method that can be used without pentester.…

1 year ago

Demonized Shell: Advancing Linux Persistence Techniques and Security Implications.

The article "Demonized Shell: Advancing Linux Persistence Techniques and Security Implications" goes into great detail about D3m0n1z3dShell, a complex tool…

1 year ago

EDRSilencer: A Tool for Managing EDR Outbound Traffic with Windows Filtering Platform.

Inspired by the closed source FireBlock tool FireBlock from MdSec NightHawk, I decided to create my own version and this tool was…

1 year ago

Cheat.sh: Unified Access to the Best Community Driven Cheat Sheets.

Of course! The piece "Cheat.sh: Unified Access to the Best Community Driven Cheat Sheets" talks about a new tool for…

1 year ago

Red-Teamer Diaries: Insights and Techniques for Effective Penetration Testing

Publicly accessible notes about my pentesting/red teaming experiments tested on several controlled environments/infrastructures that involve playing with various tools and…

1 year ago

Windows Local Privilege Escalation Cookbook (In Progress)

Description (Keynote) This Cookbook was created with the main purpose of helping people understand local privilege escalation techniques on Windows…

1 year ago

HackBrowserData: A Comprehensive Guide to Decrypting and Exporting Data from Popular Browsers

HackBrowserData is a command-line tool for decrypting and exporting browser data ( passwords, history, cookies, bookmarks, credit cards, download records, localStorage…

1 year ago

Linpmem – A Physical Memory Acquisition Tool for Linux

Linpmem is a Linux x64-only tool for reading physical memory. Like its Windows counterpart, Winpmem, this is not a traditional memory…

1 year ago

Process Stomping: Advanced Technique for Executing Shellcode in Targeted Executable Sections

Cybersecurity is a field that is always changing, and new techniques are always being made to improve both offensive and…

1 year ago