Comprehensive tutorial on modern exploitation techniques with a focus on understanding exploitation from scratch.
An Omnibus is defined as a volume containing several novels or other items previously published separately and that is exactly what the InQuest Omnibus project intends to be for Open Source Intelligence collection, research, and artifact management. By providing an easy to use interactive command line application, users are able to create sessions to investigate various artifacts such as IP addresses, domain names, email addresses, usernames, file hashes, Bitcoin addresses, and more as we continue to expand. This project has taken motivation from the greats that came before it such as SpiderFoot, Harpoon, and DataSploit. Much thanks to those great authors for contributing to the world of open source. The application is written with Python 2.7 in mind and has been successfully tested on OSX and Ubuntu 16.04 environments. This is a beta of the final application and as such, feedback is greatly appreciated.
Comprehensive tutorial on modern exploitation techniques with a focus on understanding exploitation from scratch.
A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.
Abusing SCF files to gather user hashes from an unauthenticated writable Windows-based file share.
Hidden parameters discovery suite
A framework for testing and exploiting race conditions in software
A lightweight and portable Docker container for penetration testers and CTF players