Find and exploit sudo misconfigurations.
Outils pour exploit
Trigger known vulnerabilities or weaknesses to gain access.
76 tools indexed
Payload generation framework.
.NET post-exploitation library.
DNS rebinding attack framework.
Open-source adversary emulation framework.
Social-engineering attack framework.
Build vulnerable instrumented labs.
Cloud adversary emulation.
Cross-platform O365 / AAD attack framework.
Send phishing via Microsoft Teams.
iOS tweak development framework.
PowerShell downgrade attack.
High-volume Burp HTTP fuzzer.
Defeat Windows User Account Control.
Rogue access point framework.
Auto-exploit BloodHound paths.
Swiss army knife for network attacks.
Encrypted C2 over DNS.
Intranet comprehensive scanner.
Test and exploit JWT vulnerabilities.
Windows credential extraction.
Generate NTLMv2 hash theft files.
GDB plug-in for exploit dev and RE.
CTF framework for exploit dev.