kalilinuxtools

POSTDump – Evading Detection And Safely Dumping LSASS Memory

Another tool to perform minidump of LSASS process using few technics to avoid detection. POSTDump is the C# / .NET…

1 year ago

Mastering WificraK – Unveiling the Power of Advanced Wi-Fi Exploits

Introduction The majority of WPA2-PSK and WEP encryption attacks can be carried out using the WificraK tool. Using crunch or…

1 year ago

Guide-CEH-Practical-Master – Tools, Techniques And Exam Mastery

Welcome to the 'Guide-CEH-Practical-Master', your essential roadmap to mastering the Certified Ethical Hacker (Practical) exam. Dive deep into the tools,…

1 year ago

GhostRecon – An In-depth Guide To A Compact OSINT Tool For Linux

In the vast world of Linux tools, GhostRecon stands out as a streamlined solution for research and OSINT (Open Source…

1 year ago

LatLoader – Evading Elastic EDR In Lateral Movement

LatLoader is a PoC module to demonstrate automated lateral movement with the Havoc C2 framework. The main purpose of this…

1 year ago

Telegram Explorer (TEx) – The Ultimate Toolkit for Telegram Data Analysis

TEx is a Telegram Explorer tool created to help Researchers, Investigators and Law Enforcement Agents to Collect and Process the…

1 year ago

HackSys Extreme Vulnerable Driver – A Deep Dive into HEVD Exploitation

The HackSys Extreme Vulnerable Driver (HEVD) is a Windows Kernel driver that is intentionally vulnerable. It has been developed for security researchers and enthusiasts to improve their skills…

1 year ago

OSGINT – A Deep Dive Into GitHub User Information Retrieval

In the vast realm of GitHub, the ability to glean information about users can be invaluable for various purposes. 'OSGINT:…

1 year ago

Challenges in Proposal Management and How To Overcome Them

Enhancing Proposal Management Proposal management can be a complex task. Companies across all industries face various challenges when managing the…

1 year ago

VTI-Dorks – Mastering Threat Hunting With VirusTotal Queries

Awesome VirusTotal Enterprise Search Queries (formerly Virustotal Intelligence or VTI). In today's evolving cyber landscape, effective threat hunting is paramount.…

1 year ago