Usage The BackupOperatorToolkit (BOT) has 4 different mode that allows you to escalate from Backup Operator to Domain Admin.Use “runas.exe …
Killer – Is A Tool Created To Evade AVs And EDRs Or Security Tools
It’s a AV/EDR Evasion tool created to bypass security tools for learning, until now the tool is FUD. Module Stomping …
Fiber – Using Fibers To Run In-Memory Code In A Different And Stealthy Way
A fiber is a unit of execution that must be manually scheduled by the application rather than rely on the …
Kali Linux 2023.2 – Penetration Testing and Ethical Hacking Linux Distribution
Time for another Kali Linux release! – Kali Linux 2023.2. This release has various impressive updates. Source : KitPloit – …
C2-Hunter – Extract C2 Traffic
C2-Hunter is a program designed for malware analysts to extract Command and Control (C2) traffic from malwares in real-time. The …
Bypass-Sandbox-Evasion – Bypass Malware Sandbox Evasion Ram Check
Sandboxes are commonly used to analyze malware. They provide a temporary, isolated, and secure environment in which to observe whether …
PythonMemoryModule – Pure-Python Implementation Of MemoryModule Technique To Load Dll And Unmanaged Exe Entirely From Memory
“Python memory module” AI generated pic – hotpot.ai pure-python implementation of MemoryModule technique to load a dll or unmanaged exe …
XSS-Exploitation-Tool – An XSS Exploitation Tool
XSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site Scripting vulnerabilities. This tool is …
LinkedInDumper – Tool To Dump Company Employees From LinkedIn API
Python 3 script to dump company employees from LinkedIn API Description LinkedInDumper is a Python 3 script that dumps employee …
Kubestroyer – Kubernetes Exploitation Tool
About The Project Kubestroyer is a Golang exploitation tool that aims to take advantage of Kubernetes clusters misconfigurations. The tool …