Category: Exploitation

relayer

relayer: SMB Relay Attack Script

Relayer – SMB Relay Attack Script. Relayer is an SMB relay Attack Script that automates all the necessary steps to scan for systems with SMB signing disabled and relaying authentication request to these systems...

GyoiThon

GyoiThon: growing penetration test tool using Machine Learning

GyoiThon GyoiThon is a growing penetration test tool using Machine Learning. It identifies the software installed on the web server (OS, Middleware, Framework, CMS, etc…) based on the learning data. After that, it executes valid exploits for the identified...

unicorn

Unicorn v3.4.4 released: PowerShell downgrade attack

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber’s PowerShell attacks and the PowerShell bypass technique presented by David Kennedy (TrustedSec) and...

CoffeeShot

CoffeeShot: Avoid Detection with Memory Injection

CoffeeShot: Avoid Detection with Memory Injection CoffeeShot is an evasion framework that injects payload from Java-based programs into designated processes on Microsoft Windows. It assists blue team members in assessing the effectiveness of their...

ipv4Bypass

ipv4Bypass: Using IPv6 to Bypass Security

ipv4Bypass Using IPv6 to Bypass Security how the tool works 1) Sends an ICMP echo request (ping6 ff02::1%eth0) to the broadcast address (ff02::1), all IPv6 hosts in the local network will reply 2) Sends...

ibombshell

ibombshell: Dynamic Remote Shell

ibombshell – Dynamic Remote Shell ibombshell is a tool written in Powershell that allows you to have a prompt at any time with post-exploitation functionalities (and in some cases exploitation). It is a shell that...