Category: Exploitation

Nuages

Nuages: A modular C2 framework

Nuages A modular C2 Nuages aims at being a C2 framework in which back end elements are open source, whilst implants and handlers must be developed ad hoc by users. As a result, it...

Sn1per

Sn1per v7.0 releases: Automated Pentest Recon Scanner

Sn1per Community Edition is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. Sn1per Professional is Xero Security’s premium reporting add-on for Professional Penetration Testers, Bug...

Linux Binary Exploitation

BinExp: Linux Binary Exploitation

Linux Binary Exploitation Topics Lecture 1. Memory Layout of the C program. ELF binaries. Overview of the stack during the function call. Assembly code for the function call and return. The concept of $ebp and $esp. Executable...

slack-c2bot

slack-c2bot: Slack Web Services as a C2 Channel

Slack C2bot Slack C2bot that executes commands and returns the output. Install go get “github.com/nlopes/slack” Usage ./build.sh [$CHANID] [$SLACKTOKEN] The build script will generate a UUID for your bot. If you dont already have...