Buffer Overflow Attack explanied
A buffer overflow occurs when a program or process attempts to write more data to a fixed length block of memory, or buffer , than the buffer is allocated to hold. Since buffers are created to contain...
View ArticleMousejack Transmit - Wireless Mouse/Keyboard Attack With Replay/Transmit PoC
This is code extending the mousejack tools https://github.com/RFStorm/mousejack.Replay/transmit tools have been added to the original tools.POC packets based on a Logitech Wireless Combo MK220 which...
View ArticleStitch - Python Remote Administration Tool (RAT)
This is a cross platform python framework which allows you to build custom payloads for Windows, Mac OSX and Linux as well. You are able to select whether the payload binds to a specific IP and port,...
View ArticleEggShell - iOS/macOS Remote Administration Tool
EggShell is an iOS and macOS post exploitation surveillance pentest tool written in Python.This tool creates 1 line multi stage payloads that give you a command line session with extra functionality....
View ArticleDLLInjector v0.2
This tool aims to implement various DLL injection techniques that work across multiple Windows versions. The user defines a DLL, a process ID, and technique and the tool attempts to inject the DLL into...
View ArticleMirai Botnet Source Code for Research
Linux Mirai Source Code for Research/IoT Development PurposesRequirementsgccgolangelectric-fencemysql-servermysql-clientWarningThe zip file for the is repo is being identified by some AV programs as...
View ArticleArachni - Web Application Security Scanner Framework
Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.It is smart, it trains itself...
View ArticlePowerSploit - A PowerShell Post-Exploitation Framework
PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment. PowerSploit is comprised of the following modules and...
View ArticlePowerShell Empire
Empire is a pure PowerShell post-exploitation agent built on cryptologically-secure communications and a flexible architecture. Empire implements the ability to run PowerShell agents without needing...
View ArticlePowerShell Empire Web Interface
PowerShell Empire WebPowerShell Empire Web utilizes the Empire REST API Server. It is a web interface for using PowerShell Empire.Run Empire REST API ServerGet PowerShell Empire:...
View ArticleHashView - Hashcat Web Inteface
Hashview is a tool for security professionals to help organize and automate the repetitious tasks related to password cracking. Hashview is a web application that manages hashcat (https://hashcat.net)...
View ArticleTcpreplay - Pcap editing and replaying utilities
Tcpreplay is a suite of free Open Source utilities for editing and replaying previously captured network traffic. Originally designed to replay malicious traffic patterns to Intrusion...
View Article64BASE Boot2Root - HACKABLE VM GAME
Difficulty Rating[BEGINNER - INTERMEDIATE]Capture The FlagsThere are 6 flags to collect. Each in the format of flag1{ZXhhbXBsZSBmbGFnCg==}Beat the Empire and steal the plans for the Death Star before...
View ArticleFAME - Automates Malware Evaluation
FAME is a recursive acronym meaning “FAME Automates Malware Evaluation”.It is meant to facilitate analysis of malicious files, leveraging as much knowledge as possible in order to speed up and automate...
View ArticleJSShell - An interactive multi-user web JS shell
An interactive multi-user web based JS shell written in Python with Flask (for server side) and of course Javascript and HTML (client side). It was initially created to debug remote esoteric browsers...
View ArticleTweets metadata scraper & activity analyzer
The goal of this simple python script is to analyze a Twitter profile through its tweets by detecting:Average tweet activity, by hour and by day of the weekTimezone and language set for the Twitter...
View ArticleBuild Your Own PwnPhone
We’ll attempt to show you how to build your own Pwn Phone running the Kali operating system and our AOPP (Android Open Pwn Project) image.Let’s get cracking…Flashing the PhoneDownload the Recovery...
View ArticleTurns Out Microsoft Has Already Patched Exploits Leaked By Shadow Brokers
The latest dump of hacking tools allegedly belonged to the NSA is believed to be the most damaging release by the Shadow Brokers till the date.But after analyzing the disclosed exploits, Microsoft...
View ArticleWall of Sheep - a password sniffing tool
The Wall of Sheep is dedicated to network security research and we make use of a powerful API provided by RethinkDB, Firebase to store and sync data in realtime.Without SSL/TLS, your password is just...
View Article