This module exploits stack-based buffer overflow vulnerability in i-Ftp v2.20, caused by a long time value set for scheduled download. By persuading the victim to
First capture the victim’s ram using dump it tool. (For details visit here) Download bulk extractor viewer (from here) and install it in your PC. Now open bulk
First capture the victim’s ram using dump it tool. (For details visit here) Download bulk extractor viewer (from here) and install it in your PC.
Welcome to another boot2root CTF challenge “Xerxes: 1” uploaded by bas on vulnhub. As, there is a theme, and you will need to snag the
This module extracts and decrypts LastPass master login accounts and passwords Exploit Targets lastpass Requirement Attacker: kali Linux Victim PC: Windows 7 Open Kali terminal
This module exploits a NULL Pointer Dereference in win32k.sys, the vulnerability can be triggered through the use of TrackPopupMenu. Under special conditions, the NULL pointer
BadBlue is software which can use for photos, videos, music, and business files with friends and colleagues instantly. First scan badblue service the victim pc
This module will attempt to enumerate which patches are applied to a windows system based on the result of the WMI query: SELECT HotFixID FROM
This module exploits the embedded Lua interpreter in the admin web interface for versions 4.3.8 and below. When supplying a specially crafted HTTP POST request