HackinGuyz
  • Home
  • About Me
  • Analysis
  • Exploits/Modules
    • CompMgmtLauncher - Fileless UAC Bypass
    • Python 2.x Buffer Overflow POC
    • Firefox 49.0.1 - DOS (Powershell Empire Stager)
    • CVE-2016-6195 Vbulletin 4.2.3--lower versions SQLi
    • deploy_service_payload - Post MSF module For Deploy A Persistence Service Payload
    • persistence/privilege_escalation in WSearch
    • CleanTracks
    • MSI_privilege_escalation
    • MS16-051 with in Empire
  • Downloads
    • Kimi
    • CrisPY
    • Venom
    • Nmapii
Saturday, 6 May 2017

SlackBots - Rebirth of IRCbots?

›
Its not been a while since Jeremy and Jeff Dimmock made a post and after a bit of googling, i came up with an idea "why not making som...
Saturday, 4 March 2017

KIMI - Malicious Debian Package Creator

›
Hey readers ! During last month's ending i was thinking on latest updates of Venom Shellcode Generator and while having conversation ...
Monday, 5 December 2016

CTF HackDay: Albania - WalkThrough

›
Hey Readers, So here i'm up with another CTF i've recently solved. It was kinda tricky (unexpectedly). But after irritating senior...
1 comments
Sunday, 13 November 2016

deploy_service_payload - Post MSF module For Deploy A Persistence Service Payload

›
[What Does This Module Do?]  deploy_service_payload.rb uploads your payload.exe to target system (DEPLOY_PATH) and creates a service poin...
Sunday, 30 October 2016

WSearch - Privilege Escalation via Weak Service Permissions (MSF Module)

›
Hi guys!! So, almost after a week full of hard work we finally made our another post module for windows privilege escalation after MSI_pri...
Saturday, 15 October 2016

CTF FristiLeaks: 1.3 - Walkthrough

›
I generally doesn't solves CTFs but after viewing walkthrough of one of my close friend i thought even i must give it a try :P (yea the...
›
Home
View web version
Copyright © HackinGuyz | Powered by Hackin Guyz
Design by Chaitanya Haritash | Blogger Theme by Hackin Guyz -