
VDiscover is a tool designed to train a vulnerability detection predictor. Given a vulnerability discovery procedure and a large enough number of training testcases, it…

In this project, we took advantage of a buffer overflow attack in order to gain access to a vulnerable server. This attack, in brief, involves…

A backdoor is perceived as a negative vulnerability because it allows an attacker to obtain access to a victim’s machine without proper credentials. However, a…

scepwn-ng is a wrapper script for launching winexe/psexec at a target, which then runs shellcode exec from a samba share with a msf generated reverse…

Lightidra is a mass-tool commanded by irc that allows scanning and exploiting routers for make BOTNET (in rx-bot style), in addition to this, with aidra…

kbdlogd is a case study purpose daemon to capture stream data from the keyboard, that uses a /dev/input/* kbd device. It needs the root privileges…

Changelog MITMf v0.9.7 : – Config file now updated on the fly – Addition of the ScreenShotter and Ferret-NG plugins – Responder code re-written – Addition…

This trick shows you how to create a PAM module backdoor that allows to execute an user login with your own custom password. If you…