A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
This tutorial provides a comprehensive guide on modern exploitation techniques, focusing on understanding exploitation from scratch, including topics like memory layout of C programs, ELF binaries, stack overview during function calls, assembly code for function calls and returns, concept of $ebp and $esp, and executable memory. The tutorial also includes setting up the system using a vagrant file on a virtual box.
A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
RedWarden is a Cobalt Strike C2 Reverse proxy that evades detection by Blue Teams, AVs, EDRs, and scanners through packet inspection and malleable profile correlation.
Sublist3r is a python tool for enumerating subdomains using OSINT and various search engines.
Collection of vulnerable ARM binaries for beginner vulnerability researchers & exploit developers.
A PoC tool for generating Excel files with embedded macros without using Excel.
Linux Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis with various tools and resources.