This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the “Adaptive DLL Hijacking” …

This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the “Adaptive DLL Hijacking” …
Unmanaged PowerShell execution using DLLs or a standalone executable. Introduction PowerShx is a rewrite and expansion on the PowerShdll project. …
LittleCorporal.exe C:\beacon.bin explorer.exe .____ …” name=”twitter:description”> LittleCorporal.exe C:\beacon.bin explorer.exe .____ …” name=”description”> LittleCorporal.exe C:\beacon.bin explorer.exe .____ …” property=”og:description”> LittleCorporal: A …
This tool implements a userland exploit that was initially discussed by James Forshaw (a.k.a. @tiraniddo) – in this blog post …
ssh-mitm is an intercepting (mitm) proxy server for security audits. Redirect/mirror Shell to another ssh client supported in 0.2.8 Replace …
Widevine is a Google-owned DRM system that’s in use by many popular streaming services (Netflix, Spotify, etc.) to prevent media …
Hijacking legitimate digital signatures is a technique that can be used during red team assessments in order to sign PowerShell …
QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all …