Exploits
Some proof of concepts to reproduce and/or exploit vulnerability.
Some proof of concepts to reproduce and/or exploit vulnerability.
1. VNC to access Kali Linux on Raspberry Pi
2. Bypass Defender and other thoughts on Unicode RTLO attacks
4. Launch shellcodes and bypass Antivirus using MacroPack Pro VBA payloads
5. Yet another sdclt UAC bypass
1. Create a daily system-update script
2. cve-2014-4943 Linux Kernel D.O.S POC
3. Modify any Java class field using reflection.
4. Hide files using SSDT hooking
5. Real-time system alerts using Twitter OAuth (the Theory)
If you appreciate my work, you may help or reward with a contribution :)