Hacking Electronic Flight Bags. Airbus NAVBLUE Flysmart+ Manager
http://www.pentestpartners.com/security-blog/hacking-electronic-flight-bags-airbus-navblue-flysmart-manager
http://www.pentestpartners.com/security-blog/hacking-electronic-flight-bags-airbus-navblue-flysmart-manager
Backdoor Activator Malware Running Rife Through Torrents of macOS Apps
https://www.sentinelone.com/blog/backdoor-activator-malware-running-rife-through-torrents-of-macos-apps
https://www.sentinelone.com/blog/backdoor-activator-malware-running-rife-through-torrents-of-macos-apps
HTTP/2 based downgrade and smuggle scanner
https://github.com/Moopinger/smugglefuzz
https://github.com/Moopinger/smugglefuzz
SiCat: is an advanced exploit search tool designed to identify and gather information about exploits from both open sources and local repositories effectively
https://github.com/justakazh/sicat
https://github.com/justakazh/sicat
NetHunter Hacker XII: Master Social Engineering using SET
https://www.mobile-hacker.com/2024/02/02/nethunter-hacker-xii-master-social-engineering-using-set
https://www.mobile-hacker.com/2024/02/02/nethunter-hacker-xii-master-social-engineering-using-set
SqlmapXPlus: is based on Sqlmap, a second version of the classic database vulnerability exploitation tool
https://github.com/co01cat/SqlmapXPlus
https://github.com/co01cat/SqlmapXPlus
pphack: The Most Advanced Client-Side Prototype Pollution Scanner
https://github.com/edoardottt/pphack
https://github.com/edoardottt/pphack
http-garden: Differential testing and fuzzing of HTTP servers and proxies
https://github.com/narfindustries/http-garden
https://github.com/narfindustries/http-garden
Initial-Registry:
it is a simple registry file that performs malicious activities when the refresh button is pressed, Such as start a malicious link, making an execution for payload, or running a malicious command line in CMD or PowerShell
https://github.com/S3N4T0R-0X0/Initial-Registry
it is a simple registry file that performs malicious activities when the refresh button is pressed, Such as start a malicious link, making an execution for payload, or running a malicious command line in CMD or PowerShell
https://github.com/S3N4T0R-0X0/Initial-Registry
Persistence – Windows Setup Script
https://pentestlab.blog/2024/02/05/persistence-windows-setup-script
https://pentestlab.blog/2024/02/05/persistence-windows-setup-script
Hacking a Smart Home Device
https://jmswrnr.com/blog/hacking-a-smart-home-device
https://jmswrnr.com/blog/hacking-a-smart-home-device
How I Hacked My College’s Site
https://infosecwriteups.com/how-i-hacked-my-colleges-site-26ae1ab872e4
https://infosecwriteups.com/how-i-hacked-my-colleges-site-26ae1ab872e4
Towards SSH3: How HTTP/3 improves secure shells
https://blog.apnic.net/2024/02/02/towards-ssh3-how-http-3-improves-secure-shells
https://blog.apnic.net/2024/02/02/towards-ssh3-how-http-3-improves-secure-shells
Disable Windows Defender
(+ UAC Bypass, + Upgrade to SYSTEM)
https://github.com/EvilGreys/Disable-Windows-Defender-
(+ UAC Bypass, + Upgrade to SYSTEM)
https://github.com/EvilGreys/Disable-Windows-Defender-
Small toolkit for extracting information and dumping sensitive strings from Windows processes
https://github.com/mlcsec/proctools
https://github.com/mlcsec/proctools
Exploring the (Not So) Secret Code of Black Hunt Ransomware
https://www.rapid7.com/blog/post/2024/02/05/exploring-the-not-so-secret-code-of-blackhunt-ransomware-2
https://www.rapid7.com/blog/post/2024/02/05/exploring-the-not-so-secret-code-of-blackhunt-ransomware-2
MemshellKit: highly customized memory shell one-click injection tool for multiple frameworks
https://github.com/W01fh4cker/MemshellKit
https://github.com/W01fh4cker/MemshellKit
MultiDump: is a post-exploitation tool written in C for dumping and extracting LSASS memory discreetly, without triggering Defender alerts, with a handler written in Python
https://github.com/Xre0uS/MultiDump
https://github.com/Xre0uS/MultiDump