Category: Network PenTest

HiddenPowerShellDll

HiddenPowerShellDll: Exploitation tool in Powershell

HiddenPowerShell This project was created to explore the various evasion techniques involving PowerShell Amsi ScriptBlockLogging Constrained Language Mode AppLocker Metasploit module and payload The module manages the delivery of an hta file and a...

Linux Binary Exploitation

BinExp: Linux Binary Exploitation

Linux Binary Exploitation Topics Lecture 1. Memory Layout of the C program. ELF binaries. Overview of the stack during the function call. Assembly code for the function call and return. The concept of $ebp and $esp. Executable...

backHack

backHack: perform Android app analysis

backHack a tool to perform Android app analysis by backing up and extracting apps, allowing you to analyze and modify file system contents for apps. Download git clone https://github.com/MooseDojo/backHack.git Changelog v3.1: Download APK from device...

Pocsuite

Pocsuite v2.0.8 releases: open-sourced remote vulnerability testing framework

Pocsuite is an open-sourced remote vulnerability testing and proof-of-concept development framework developed by the Knownsec Security Team. It comes with a powerful proof-of-concept engine, many niche features for the ultimate penetration testers and security researchers....

gorsh

gorsh: golang reverse shell

gorsh A Golang Implant and Tmux-driven C2 Interface Originally forked from – sysdream/hershell Fork Changes Changes after fork: Uses tmux as a pseudo-C2-like interface, creating a new window with each agent callback Download files with...