Category: Exploitation

DNS-over-HTTPS

goDoH v1.6 releases: A DNS-over-HTTPS C2

godoh godoh is a proof of concept Command and Control framework, written in Golang, that uses DNS-over-HTTPS as a transport medium. Currently, supported providers include Google, Cloudflare but also contains the...

unicorn

Unicorn v3.17 released: PowerShell downgrade attack

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber’s PowerShell attacks and the PowerShell bypass technique presented by...

Electron Exploitation

beemka: Basic Electron Exploitation

BEEMKA – Electron Exploitation Toolkit Modules Available modules [ rshell_cmd ] Windows Reverse Shell [ rshell_linux ] Linux Reverse Shell [ screenshot ] Screenshot Module [ rshell_powershell ] PowerShell Reverse...

shellcode generation tool

donut v0.9.3 releases: shellcode generation tool

Donut is a shellcode generation tool that creates position-independent shellcode payloads from .NET Assemblies. This shellcode may be used to inject the Assembly into arbitrary Windows processes. Given an arbitrary...

extract Kerberos ticket

tickey: extract Kerberos tickets from Linux kernel keys

Tickey A tool to extract Kerberos tickets from Linux kernel keys. Based on the paper Kerberos Credential Thievery (GNU/Linux). Install git clone https://github.com/TarlogicSecurity/tickey cd tickey/tickey make CONF=Release After that, binary...