Exploits
Some proof of concepts to reproduce and/or exploit vulnerability.
Some proof of concepts to reproduce and/or exploit vulnerability.
3. VNC to access Kali Linux on Raspberry Pi
4. Digging passwords in Linux swap
5. Launch shellcodes and bypass Antivirus using MacroPack Pro VBA payloads
2. Code Injection - Process PE Injection Basics
4. VNC to access Kali Linux on Raspberry Pi
5. Linux security using a limited group (PAM modules)
If you appreciate my work, you may help or reward with a contribution :)