Repositories The project consists of repositories: Disclaimer It’s only for education purposes. Avoid using it on the production Active Directory …

Repositories The project consists of repositories: Disclaimer It’s only for education purposes. Avoid using it on the production Active Directory …
KRIe is a research project that aims to detect Linux Kernel exploits with eBPF. KRIe is far from being a …
Jeeves is made for looking to Time-Based Blind SQLInjection through recon. – Installation & Requirements: Installing Jeeves OR $ git …
EDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Kernel callbacks and …
This tool is designed to aid an operator in modifying ADCS certificate templates so that a created vulnerable state can …
Monitor the Internet’s background noise Melody is a transparent internet sensor built for threat intelligence and supported by a detection …
To run the vulnerable SpringBoot application run this docker container exposing it to port 8080. Example: docker run -it -d …
WebApp intentionally made vulnerable to Race Condition Description Race Condition vulnerability can be practiced in the developed WebApp. Task is …
Check out our RPC Firewall blog post to gain better understanding of RPC, RPC attacks and the solution: the RPC …
Office 365 and Exchange Enumeration It is widely known that OWA (Outlook Webapp) is vulnerable to time-based user enumeration attacks. …