top of page

Changes is the only thing which never change
IT news & Information Technology Comparison
HTA
Creating payload: < html > < body > < script > var c = 'cmd.exe' new ActiveXObject ( 'WScript.Shell' ). Run (c); </ script > </...
WSH
Creating payload: Set shell = WScript.CreateObject( "Wscript.Shell" ) shell.Run( "C:\Windows\System32\calc.exe " & ...


OffensiveVBA
A collection of offensive techniques, scripts and useful links for achieving code execution and defense evasion via office macros. Usage:...


Kernel Callback Functions
This technical note provides a comprehensive list all the APIs exported by the Windows Kernel, for driver writes to register callback...


NTAPI Undocumented Functions
This site provides information on undocumented Windows internals, system calls, data structures, and other low-level details of the...


WordSteal
This script will create a Microsoft Word Document with a remote image, allowing for the capture of NTML hashes from a remote victim...


Freeze
Freeze is a payload creation tool used for circumventing EDR security controls to execute shellcode in a stealthy manner. Freeze utilizes...


Shellter
Shellter is a dynamic shellcode injection tool, and the first truly dynamic PE infector ever created. It can be used in order to inject...


Msfvenom
Msfvenom allows the creation of payloads for various operating systems in a wide range of formats. It also supports obfuscation of...
Resource Development tools
msfvenom (Payload creation) Chimera (PowerShell obfuscation) Shellter (Dynamic shellcode injection tool) Freeze (Payload creation...


Chimera
Chimera is a PowerShell obfuscation script designed to bypass AMSI and antivirus solutions. It digests malicious PS1's known to trigger...


Unveiling the Impact of Open Source in the World of Cybersecurity: A Closer Look at Its Influence
The world of cybersecurity is in a constant state of change, shaped by an ongoing struggle between security experts and cybercriminals....


What are the Essential Tools for Ethical Hacking Beginners?
In today's digital world, where cyber threats are on the rise, ethical hacking stands out as an essential practice. Ethical hackers, also...


Uncovering the World of Ethical Hacking: Tools and Techniques for Digital Exploration
In our digital age, cybersecurity isn't just important—it's essential. With nearly 80% of companies experiencing some form of data...


RDP connection and security
There are serious threats to your local system when you use Remote Desktop Protocol (RDP) with local discs enabled. Potential virus on...
bottom of page