∃lio Torri∫i

System, Network, Security Engineer

Infosec resources archive


WHP: Micro$oft Windows Hacking PackApr 2018windows-exploits
eternal_check: Eternal Blue , Romance , Synergy , ChampionApr 2018windows-exploits
A bunch of Red Pills: VMware EscapesApr 2018hardware
Hijack of AWS Route 53 used to reroute web traffic for 2 hoursApr 2018networking-softwareMitMweb
Evilginx - Advanced Phishing with 2-Factor-Authentication bypassApr 2018MitMwebservicesnetworking-software
OpenResty: Enhanced nginx for API and dynamic web gateway developmentApr 2018networking-softwareweblinux-softwaremacos-ios-softwarewindows-software
PowerUpSQL: PowerShell SQL Server attack toolApr 2018database-exploitswindows-exploits
Dosfuscation: exploring the depths of cmd.exe obfuscation and detectionApr 2018obfuscationevasionwindows-post-exploitation
phpggc: PHP generic gadget chains (unserialize)Apr 2018PHPlinux-post-exploitationwindows-post-exploitationweb-exploits
moloch: full packet capturingApr 2018networking-software
index-of.es/EBooks/Apr 2018knowledge-sources
whonow: DNS Rebinding attacksApr 2018networking-softwareweb-exploits
C2 with Digital Ocean: C2KApr 2018evasionexfiltrationlinux-post-exploitationmacos-ios-post-exploitationprogrammingwindows-post-exploitation
zero width charactersApr 2018evasionexfiltrationobfuscation
Be careful what you copy: Invisibly inserting usernames into text with Zero-Width CharactersApr 2018evasionexfiltrationobfuscationweb-exploits
tor-2-ipv6Apr 2018networking-softwarejust-cool
Subliminal Communication in Backdoored EncryptionApr 2018OpSeccrypto
DNSCryptApr 2018networking-software
Structured text toolsApr 2018scripting
bad_ducky: Rubber Ducky cloneApr 2018hardwareUSBwindows-exploitsmacos-ios-exploitslinux-exploits
mimikatzApr 2018windows-post-exploitation
magescan: Magento scannerApr 2018vulnerability-scanningweb-exploitsreconnaissance
pyfiscan: CMS-framework fingerprintingApr 2018reconnaissancevulnerability-scanning
PDF analysisApr 2018reverse-eng
peepdfApr 2018reverse-eng
credssp: CVE-2018-0886Apr 2018windows-exploits
mimic: covert execution in LinuxApr 2018linux-post-exploitation
tinfoleak: Twitter intelligenceApr 2018reconnaissanceservices
gpg_reaper: Obtain/Steal/Restore GPG Private KeysApr 2018windows-post-exploitationcrypto
High Sierra , Avast and MetasploitApr 2018evasionmacos-ios-post-exploitation
airbash: automated WPA PSK captureApr 2018WiFiscripting
ADAuditApr 2018windows-software
LOLBAS: Living Off The Land Binaries And ScriptsApr 2018windows-post-exploitation
Passhunt: default credentials for network devices, web applications and moreMar 2018cryptohardwareweb-exploits
Payload Generation using SharpShooterMar 2018evasionwindows-post-exploitation
tactical-exploitation toolsMar 2018windows-post-exploitationwindows-exploits
12 Million Sensitive URLs Available for DownloadMar 2018web-exploits
AD icebreakerMar 2018reconnaissancewindows-exploitswindows-software
CBM: Car Backdoor MakerMar 2018CANhardware
Corporate Wireless HackingMar 2018WiFi
SSL Threat ModelMar 2018transportOpSecnetworking-software
IBM Q ExperienceMar 2018just-cool
WhatCMS: CMS Detection and ExploitMar 2018reconnaissanceCMS-exploitsweb-exploits
Web app security testing with browsersMar 2018vulnerability-scanningreconnaissanceweb-exploits
APT notesMar 2018knowledge-sourcesweb
FruityWifi: wireless auditing toolMar 2018WiFi
PE details - Ange AlbertiniMar 2018programming
Total Meltdown Windows 7Mar 2018windows-exploitshardware
retire.js: known-vulnerable-js-libs scannerMar 2018web-exploitsvulnerability-scanning
backdoor-controller: A stelthy Sethc.exe backdoorFeb 2018windows-post-exploitation




Elio Torrisi

The Netherlands