This is a proof of concept of how a ransomware works, and some techniques that we usually use to hijack our files. This project is written in C# using the net...
Archive - December 2020
Karkinos is a light-weight ‘Swiss Army Knife’ for penetration testing and/or hacking CTF’s. Currently, Karkinos offers the following:...
HiJackThis Fork is a free utility for Microsoft Windows that scans your computer for settings changed by adware, spyware, malware and other unwanted programs...
A tool written for cobalt-strike’s execute-assembly command that allows for more efficent querying of AD. Key Features List all Domain Admins Custom LDAP...
The program is designed to obfuscate the shellcode. Currently the tool supports 2 encryption. 1) XOR 2) AES The tool accepts shellcode in 4 formats. 1) base64...
PYTMIPE (PYthon library for Token Manipulation and Impersonation for Privilege Escalation) is a Python 3 library for manipulating Windows tokens and managing...
Blog can be found at Script made for all your javascript recon automation in bugbounty. Just pass subdomain list to it and options according to your preference...
enum4linux-ng.py is a rewrite of Mark Lowe’s (former Portcullis Labs now Cisco CX Security Labs) enum4linux.pl, a tool for enumerating information from...
Aclpwn.py is a tool that interacts with BloodHound to identify and exploit ACL based privilege escalation paths. It takes a starting and ending point and will...
Without practice, theory is dead. Applied knowledge is essential in any area, especially in cybersecurity, and practice is the only way to make learning...