Exploits
Some proof of concepts to reproduce and/or exploit vulnerability.
Some proof of concepts to reproduce and/or exploit vulnerability.
1. Digging passwords in Linux swap
2. Launch shellcodes and bypass Antivirus using MacroPack Pro VBA payloads
3. Bypass Defender and other thoughts on Unicode RTLO attacks
5. Code Injection - Weaponize GhostWriting Injection
1. cve-2014-7822 Linux Kernel D.O.S POC
2. Hide HTA window for RedTeam
3. Advanced MacroPack payloads: XLM Injection
4. VNC to access Kali Linux on Raspberry Pi
5. Bypass Antivirus Dynamic Analysis
If you appreciate my work, you may help or reward with a contribution :)