Category: Network PenTest

Electron Exploitation

beemka: Basic Electron Exploitation

BEEMKA – Electron Exploitation Toolkit Modules Available modules [ rshell_cmd ] Windows Reverse Shell [ rshell_linux ] Linux Reverse Shell [ screenshot ] Screenshot Module [ rshell_powershell ] PowerShell Reverse Shell [ keylogger ]...

unicorn

Unicorn v3.8 released: PowerShell downgrade attack

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber’s PowerShell attacks and the PowerShell bypass technique presented by David Kennedy (TrustedSec) and...

shellcode generation tool

donut: shellcode generation tool

Donut is a shellcode generation tool that creates position-independent shellcode payloads from .NET Assemblies. This shellcode may be used to inject the Assembly into arbitrary Windows processes. Given an arbitrary .NET Assembly, parameters, and...

objection runtime mobile exploration

objection v1.6.5 released: runtime mobile exploration

objection Runtime Mobile Exploration   introduction – objection Runtime Mobile Exploration objection is a runtime mobile exploration toolkit, powered by Frida. It was built with the aim of helping assess mobile applications and their security posture without...

dependency-track

dependency-track v3.5.0 releases: intelligent Software Composition Analysis (SCA) platform

Dependency-Track Modern applications leverage the availability of existing components for use as building blocks in application development. By using existing components, organizations can dramatically decrease time-to-market. Reusing existing components, however, comes at a cost....