MOSE is a post exploitation tool that enables security professionals with little or no experience with configuration management (CM) technologies to leverage them to compromiseRead more
Hackers employ various phishing campaigns and as much they are tried to shut down, they always find new ways. Recently, a new phishing campaign wasRead more
CDK is an open-sourced container penetration toolkit, designed for offering stable exploitation in different slimmed containers without any OS dependency. It comes with useful net-toolsRead more
drow is a command-line utility that is used to inject code and hook the entrypoint of ELF executables (post-build). It takes unmodified ELF executables asRead more
Researchers at Eye Control security discovered a hard-coded admin-level backdoor account as a Zyxel firmware binary revealed username and password. Admin-Level Backdoor Discovered in ZyxelRead more
Paradoxia Remote Access Tool. Features Paradoxia Console Feature Description Easy to use Paradoxia is extremely easy to use, So far the easiest rat! Root ShellRead more
EternalBlue suite remade in C which includes: MS17-010 Exploit, EternalBlue/MS17-010 vulnerability detector, DoublePulsar detector and DoublePulsar UploadDLL & Shellcode[*] ms17_vuln_status.cpp – This program sends 4Read more
IS Raid is a native IIS module that abuses the extendibility of IIS to backdoor the web server and carry out custom actions defined byRead more
ADS goes here!If you don't see it, then please turn OFF
AD blocker for this website.
Our ads are not aggressive and help us
pay for the server and coffee.
THANK YOU for your support!