A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
PwnAuth is an open-source tool for generating and managing authentication tokens, allowing penetration testers and red teams to simulate attacks and test defenses. It provides a flexible framework for creating custom authentication tokens, making it easier to test and validate authentication mechanisms. With PwnAuth, users can generate tokens for various protocols, including Kerberos, NTLM, and LDAP. The tool also supports token manipulation, allowing users to modify and customize tokens to suit their testing needs. PwnAuth is designed to be highly customizable, with a modular architecture that enables users to add new token types and protocols as needed. This makes it an ideal tool for advanced penetration testing and red teaming exercises.
A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
A macOS Initial Access Payload Generator for penetration testing and red teaming exercises.
A C2 front flow control tool designed to evade detection by Blue Teams, AVs, and EDRs.
Explore the top million websites, ranked by referring subnets, and gain insights into online influence and popularity.
C3 is a framework for creating custom C2 channels, integrating with existing offensive toolkits.
A PoC tool for generating Excel files with embedded macros without using Excel.