Exploits
Some proof of concepts to reproduce and/or exploit vulnerability.
Some proof of concepts to reproduce and/or exploit vulnerability.
2. VNC to access Kali Linux on Raspberry Pi
4. Digging passwords in Linux swap
5. Launch shellcodes and bypass Antivirus using MacroPack Pro VBA payloads
3. Iptables firewall versus nmap and hping3
4. Hide HTA window for RedTeam
5. cve-2014-9322 Linux Kernel D.O.S POC
If you appreciate my work, you may help or reward with a contribution :)