Category: Ethical Hacking

HTML Smuggling Attack

BobTheSmuggler: Leverages HTML Smuggling Attack

Bob the Smuggler “Bob the Smuggler” is a tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The tool would compress your binary (EXE/DLL) into 7z/zip...

Active Directory post-exploitation

PsMapExec: Active Directory post-exploitation tool

What is PsMapExec A PowerShell tool heavily inspired by the popular tool CrackMapExec. Far too often I find myself on engagements without access to Linux in order to make use of CrackMapExec. PsMapExec is...

Process Dumper Tool

PPLBlade: Protected Process Dumper Tool

PPLBlade Protected Process Dumper Tool that supports obfuscating memory dump and transferring it on remote workstations without dropping it onto the disk. Key functionalities: Bypassing PPL protection Obfuscating memory dump files to evade Defender...

post-exploitation container

nysm: A stealth post-exploitation container

nysm: A stealth post-exploitation container With the rise in popularity of offensive tools based on eBPF, going from credential stealers to rootkits hiding their own PID, a question came to our mind: Would it...