rsGen: An Universal Reverse Shell Command Generator
rsGen – An Universal Reverse Shell Command Generator rsGen is an universal reverse shell command generator based on Windows Batch and Jscript hybrids. Not only support the generation of raw...
rsGen – An Universal Reverse Shell Command Generator rsGen is an universal reverse shell command generator based on Windows Batch and Jscript hybrids. Not only support the generation of raw...
Exploitation / Reverse Engineering
by do son · Published May 27, 2019 · Last modified October 10, 2021
Robber Robber is a free open source tool developed using Delphi XE2 without any 3rd party dependencies. What is DLL hijacking ?! Windows has a search path for DLLs in its...
Exploitation / Reverse Engineering
by do son · Published May 21, 2019 · Last modified November 4, 2024
Sickle Sickle is a shellcode development tool created to speed up the various steps needed to create functioning shellcode. Sickle can aid in the following: Identifying instructions resulting in bad...
ACsploit: a tool for generating worst-case inputs for algorithms ACsploit is an interactive command-line utility to generate worst-case inputs to commonly used algorithms. These worst-case inputs are designed to result...
Nuages A modular C2 Nuages aims at being a C2 framework in which back end elements are open source, whilst implants and handlers must be developed ad hoc by users....
Ropper You can use ropper to display information about binary files in different file formats and you can search for gadgets to build rop chains for different architectures (x86/X86_64, ARM/ARM64,...
OneGadget When playing ctf pwn challenges we usually need the one-gadget RCE (remote code execution), which leads to call execve(‘/bin/sh’, NULL, NULL). This gem provides such gadgets finder, no need to...
Graffiti Graffiti is a tool to generate obfuscated oneliners to aid in penetration testing situations. It accepts the following languages for encoding: Python Perl Batch Powershell PHP Bash It will...
Evil Clippy A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX, and...
kimi – Malicious Debian Package generator Script to generate malicious debian packages (debain trojans). About Kimi is name inspired from “Kimimaro” one of my favorite characters from anime called...
Exploitation / Reverse Engineering
by do son · Published April 25, 2019 · Last modified October 31, 2019
Linux Binary Exploitation Topics Lecture 1. Memory Layout of the C program. ELF binaries. Overview of the stack during the function call. Assembly code for the function call and return....
Slack C2bot Slack C2bot that executes commands and returns the output. Install go get “github.com/nlopes/slack” Usage ./build.sh [$CHANID] [$SLACKTOKEN] The build script will generate a UUID for your bot. If...
fireELF fireELF is an opensource fileless Linux malware framework that’s cross-platform and allows users to easily create and manage payloads. By default, it comes with ‘memfd_create’ which is a new...
DeathMetal DeathMetal is a suite of tools that interact with Intel AMT. It’s kind of a foray into a world filled with intrigue and reversing puzzles with useful results. Since...
SharpExec SharpExec is an offensive security C# tool designed to aid with lateral movement. It currently includes: -WMIExec – Semi-Interactive shell that runs as the user. Best described as a...