Exploit_Mitigations - Knowledge Base Of Exploit Mitigations Available Across Numerous Operating Systems, Architectures And Applications And Versions
Reviewed by Zion3R
on
8:30 AM
Rating:
Ventoy - A New Bootable USB Solution
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Injector - Complete Arsenal Of Memory Injection And Other Techniques For Red-Teaming In Windows
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Advertisement
Whisker - A C# Tool For Taking Over Active Directory User And Computer Accounts By Manipulating Their msDS-KeyCredentialLink Attribute
Reviewed by Zion3R
on
5:30 PM
Rating: 5
DcRat - A Simple Remote Tool Written In C#
Reviewed by Zion3R
on
5:30 PM
Rating: 5
RemotePotato0 - Just Another "Won't Fix" Windows Privilege Escalation From User To Domain Admin
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Advertisement
Security Scorecards - Security Health Metrics For Open Source
Reviewed by Zion3R
on
5:30 PM
Rating: 5
WFH - Windows Feature Hunter
Reviewed by Zion3R
on
8:30 AM
Rating: 5
FindObjects-BOF - A Cobalt Strike Beacon Object File (BOF) Project Which Uses Direct System Calls To Enumerate Processes For Specific Loaded Modules Or Process Handles
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Backstab - A Tool To Kill Antimalware Protected Processes
Reviewed by Zion3R
on
8:30 AM
Rating: 5
DarkLoadLibrary - LoadLibrary For Offensive Operations
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Squalr - Squalr Memory Editor - Game Hacking Tool Written In C#
Reviewed by Zion3R
on
5:30 PM
Rating: 5
RdpCacheStitcher - RdpCacheStitcher Is A Tool That Supports Forensic Analysts In Reconstructing Useful Images Out Of RDP Cache Bitmaps
Reviewed by Zion3R
on
8:30 AM
Rating: 5
NamedPipePTH - Pass The Hash To A Named Pipe For Token Impersonation
Reviewed by Zion3R
on
5:30 PM
Rating: 5
FalconEye - Real-time detection software for Windows process injections
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Rustcat - Netcat Alternative
Reviewed by Zion3R
on
8:30 AM
Rating: 5
PPLdump - Dump The Memory Of A PPL With A Userland Exploit
Reviewed by Zion3R
on
5:30 PM
Rating: 5
TChopper - Conduct Lateral Movement Attack By Leveraging Unfiltered Services Display Name To Smuggle Binaries As Chunks Into The Target Machine
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Nebula - Cloud C2 Framework, Which At The Moment Offers Reconnaissance, Enumeration, Exploitation, Post Exploitation On AWS
Reviewed by Zion3R
on
5:30 PM
Rating: 5
BlueCloud - Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Subscribe to:
Posts (Atom)