Penetration Testing Blog

Nginx Bad Bot

nginx ultimate bad bot blocker V3.2018.12.1257 releases

Welcome to the Ultimate Nginx Bad Bot, User-Agent, Spam Referrer Blocker, Adware, Malware and Ransomware Blocker, Click-Jacking Blocker, Click-Redirect Blocker and Bad IP Blocker with Anti-DDOS System, Nginx Rate Limiting and WordPress Theme Detector...

HiddenPowerShellDll

HiddenPowerShellDll: Exploitation tool in Powershell

HiddenPowerShell This project was created to explore the various evasion techniques involving PowerShell Amsi ScriptBlockLogging Constrained Language Mode AppLocker Metasploit module and payload The module manages the delivery of an hta file and a...

Linux Binary Exploitation

BinExp: Linux Binary Exploitation

Linux Binary Exploitation Topics Lecture 1. Memory Layout of the C program. ELF binaries. Overview of the stack during the function call. Assembly code for the function call and return. The concept of $ebp and $esp. Executable...

backHack

backHack: perform Android app analysis

backHack a tool to perform Android app analysis by backing up and extracting apps, allowing you to analyze and modify file system contents for apps. Download git clone https://github.com/MooseDojo/backHack.git Changelog v3.1: Download APK from device...