Category: Exploitation

Shell Script Compiler

shc v4.0.3 releases: Shell script compiler

Shell Script Compiler A generic shell script compiler. Shc takes a script, which is specified on the command line and produces C source code. The generated source code is then compiled and linked to...

unicorn

Unicorn v3.8.1 released: PowerShell downgrade attack

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber’s PowerShell attacks and the PowerShell bypass technique presented by David Kennedy (TrustedSec) and...

sliver: general purpose cross-platform implant framework

Sliver Sliver is a Command and Control (C2) system made for penetration testers, red teams, and advanced persistent threats. It generates implants (slivers) that can run on virtually every architecture out there, and securely...

Electron Exploitation

beemka: Basic Electron Exploitation

BEEMKA – Electron Exploitation Toolkit Modules Available modules [ rshell_cmd ] Windows Reverse Shell [ rshell_linux ] Linux Reverse Shell [ screenshot ] Screenshot Module [ rshell_powershell ] PowerShell Reverse Shell [ keylogger ]...

shellcode generation tool

donut: shellcode generation tool

Donut is a shellcode generation tool that creates position-independent shellcode payloads from .NET Assemblies. This shellcode may be used to inject the Assembly into arbitrary Windows processes. Given an arbitrary .NET Assembly, parameters, and...

extract Kerberos ticket

tickey: extract Kerberos tickets from Linux kernel keys

Tickey A tool to extract Kerberos tickets from Linux kernel keys. Based on the paper Kerberos Credential Thievery (GNU/Linux). Install git clone https://github.com/TarlogicSecurity/tickey cd tickey/tickey make CONF=Release After that, binary should be in dist/Release/GNU-Linux/....