Category: Exploitation

ipv4Bypass

ipv4Bypass: Using IPv6 to Bypass Security

ipv4Bypass Using IPv6 to Bypass Security how the tool works 1) Sends an ICMP echo request (ping6 ff02::1%eth0) to the broadcast address (ff02::1), all IPv6 hosts in the local network will reply 2) Sends...

ibombshell

ibombshell: Dynamic Remote Shell

ibombshell – Dynamic Remote Shell ibombshell is a tool written in Powershell that allows you to have a prompt at any time with post-exploitation functionalities (and in some cases exploitation). It is a shell that...

whoof

whoof: Web-Browser Hooking Framework

whoof (Web-Browser Hooking Framework) whoof is an early stage lightweight web browser hooking framework. A web browser hook can be thought of as a backdoor in a web page allowing an attacker to execute...

Invoke-NoShell

Invoke-NoShell: All the Power with no Shell

Invoke-NoShell Invoke-NoShell outputs a Mircosoft Office Word .doc file with an embedded macro. It allows the automation of multiple similar versions of files, allowing to test how slight differences will affect it. Currently, only...

ruler exchange service

ruler v2.5 releases: abuse Exchange services

Ruler is a tool that allows you to interact with Exchange servers remotely, through either the MAPI/HTTP or RPC/HTTP protocol. The main aim is to abuse the client-side Outlook features and gain a shell...

Side-Channel Attack Lab

scale: Side-Channel Attack Lab

SCALE: Side-Channel Attack Lab. Exercises Alongside the implementation of cryptography in hardware and software, attacks on those implementations (plus associated countermeasures) form a central challenge in cryptographic engineering. This topic is sometimes termed physical security, but, either...

boofuzz

boofuzz v0.4.2 releases: Network Protocol Fuzzing for Humans

boofuzz: Network Protocol Fuzzing for Humans It is a fork of and the successor to the venerable Sulley fuzzing framework. Besides numerous bug fixes, it aims for extensibility. The goal: fuzz everything. Features Like Sulley, boofuzz...