
Legal Disclaimer: This Tools for Research and Learning Purpose Only! The goal of SIXNETtools was to demonstrate the critical lack of security inherent in certain…

LEGAL DISCLAMER The author does not hold any responsibility about the bad use of this script, remember that attacking targets without prior concent its ilegal…

Summary The Binary String Toolkit or BST for short is a rather simple utility to convert binary strings to various formats suitable for later inclusions…

ROPGenerator is a tool that makes ROP exploits easy. It enables you to automatically find gadgets or build ROP chains. The current version supports x86…

Legal Disclamer: The author does not hold any responsibility for the bad use of this tool, remember that attacking targets without prior consent is illegal…

Meltdown Exploit PoC is a Speculative optimizations execute code in a non-secure manner leaving data traces in microarchitecture such as cache. How it works? It…

LEGAL DISCLAMER: The author does not hold any responsibility about the bad use of this script, remember that attacking targets without prior concent its ilegal…