Exploits
Some proof of concepts to reproduce and/or exploit vulnerability.
Some proof of concepts to reproduce and/or exploit vulnerability.
1. Digging passwords in Linux swap
2. Launch shellcodes and bypass Antivirus using MacroPack Pro VBA payloads
3. Bypass Defender and other thoughts on Unicode RTLO attacks
5. Code Injection - Weaponize GhostWriting Injection
1. Hide meterpreter shellcode in executable
2. cve-2014-3631 Linux Kernel D.O.S POC
4. Linux security using a limited group (PAM modules)
If you appreciate my work, you may help or reward with a contribution :)