Shell command obfuscation to avoid SIEM/detection system During pentest, an important aspect is to be stealth. For this reason you …


Shell command obfuscation to avoid SIEM/detection system During pentest, an important aspect is to be stealth. For this reason you …
A comprehensive tool that provides an insightful analysis of Microsoft’s monthly security updates. IF you are interested in seing all …
AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically. How does it work? AutoPWN Suite uses nmap …
Scour is a modern module based AWS exploitation framework written in golang, designed for red team testing and blue team …
Motivation There are plenty of Linux kernel hardening config options. A lot of them are not enabled by the major …
This tool implements a userland exploit that was initially discussed by James Forshaw (a.k.a. @tiraniddo) – in this blog post …
Automatically exploit low-hanging fruit to pop a root shell. Linux privilege escalation made easy! Traitor packages up a bunch of …
mikrot8over: Fast exploitation tool for Mikrotik RouterOS up to 6.38.4 This is reworked original Mikrotik Exploit. Added Python 2 compatibility …
HikPwn, a simple scanner for Hikvision devices with basic vulnerability scanning capabilities written in Python 3.8. This project was born …
A simple embedded Linux backdoor. Compiling The Tick depends only on libcurl, so make sure you have the corresponding development …