Exploits
Some proof of concepts to reproduce and/or exploit vulnerability.
Some proof of concepts to reproduce and/or exploit vulnerability.
1. Digging passwords in Linux swap
2. Launch shellcodes and bypass Antivirus using MacroPack Pro VBA payloads
3. Bypass Defender and other thoughts on Unicode RTLO attacks
1. POSIX file capabilities, the dark side
3. Code Injection - Disable Dynamic Code Mitigation (ACG)
4. Linux filesystem security scans
If you appreciate my work, you may help or reward with a contribution :)