EDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Kernel callbacks and …

EDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Kernel callbacks and …
This tool is designed to aid an operator in modifying ADCS certificate templates so that a created vulnerable state can …
Monitor the Internet’s background noise Melody is a transparent internet sensor built for threat intelligence and supported by a detection …
To run the vulnerable SpringBoot application run this docker container exposing it to port 8080. Example: docker run -it -d …
WebApp intentionally made vulnerable to Race Condition Description Race Condition vulnerability can be practiced in the developed WebApp. Task is …
Check out our RPC Firewall blog post to gain better understanding of RPC, RPC attacks and the solution: the RPC …
Office 365 and Exchange Enumeration It is widely known that OWA (Outlook Webapp) is vulnerable to time-based user enumeration attacks. …
Detects Log4J versions on your file-system within any application that are vulnerable to CVE-2021-44228 and CVE-2021-45046. It is able to …
Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground. IAM Vulnerable uses the Terraform binary …
ELFXtract is an automated analysis tool used for enumerating ELF binaries Powered by Radare2 and r2ghidra This is specially developed …