∃lio Torri∫i

System, Network, Security Engineer

Infosec resources archive


Reptile: LKM Linux rootkitNov 2018linux-post-exploitationrootkits
Bypassing UAC using Registry KeysNov 2018windows-post-exploitationwindows-exploitsevasion
Lateral Movement – WinRMNov 2018windows-exploitswindows-post-exploitation
linux native backdoorsNov 2018linux-post-exploitation
null sessions and user enumerationNov 2018reconnaissance
EvilOSX: python post-exploitationNov 2018macos-ios-post-exploitation
XBruteForcer: WordPress, Joomla, Drupal, OpenCart, Magento bruterNov 2018CMS-exploitsvulnerability-scanning
Excel VelvetSweatshopNov 2018social-engineeringwindows-exploits
CSS-KeyloggingNov 2018web-exploits
Watchdog: Security Scanning and Vulnerability ManagementNov 2018vulnerability-scanning
Experimental post-quantum cryptography OpenVPNNov 2018cryptowindows-softwarelinux-software
wifite2: WiFi exploitation toolNov 2018WiFinetworking-softwarelinux-software
VirtualBox: macOS High SierraNov 2018macos-ios-software
Windows hardentoolsNov 2018windows-software
PWN Wiki: pentesters wikiNov 2018networking-softwarevulnerability-scanningreconnaissanceweb-exploits
Awesome Design PatternsNov 2018programmingscripting
UnsplashNov 2018just-coolservices
Windows NTFS TricksNov 2018windows-post-exploitationwindows-exploits
Executing Meterpreter in Memory on Windows 10Nov 2018windows-post-exploitationevasion
One-Lin3r: reverse, dropper and other 1-linersNov 2018windows-post-exploitationlinux-post-exploitationmacos-ios-post-exploitation
Hiding Metasploit Shellcode to Evade Windows DefenderNov 2018evasionwindows-post-exploitation
nurupo: Linux rootkitNov 2018linux-post-exploitationrootkits
Microsoft Edge - AddressBar SpoofNov 2018social-engineeringspoofingwindows-exploits
tracy: identify web apps sinks and sourcesNov 2018webvulnerability-scanning
Seth: MitM to extract clear text credentials from RDPNov 2018MitMwindows-exploits
JavaScript Coinhive in ExcelNov 2018social-engineeringwindows-exploits
CVE-2018-8897: Intel debug exceptions LPENov 2018hardware
ZooPark ~APT hackedNov 2018android-exploitswebOpSec
Decade-old Efail flaws can leak plaintext of PGP- and S/MIME-encrypted emailsNov 2018crypto
CVE-2018-1111 root RCE on RH via DHCP optionNov 2018linux-exploitsnetworking-software
Flash SWF AnalysisNov 2018web-exploitsweb
EFail PGP S/MIMENov 2018crypto
LOLBINs for LinuxNov 2018linux-exploitslinux-post-exploitation
Tcpdump ExamplesNov 2018networking-software
Inception: PCI-based DMA manipulationNov 2018hardwaremacos-ios-exploitswindows-exploits
Linux keyloggerNov 2018linux-post-exploitation
An Electron Away from Code ExecutionNov 2018windows-exploitsmacos-ios-exploitslinux-exploits
Safari-Webkit functional mapNov 2018networking-software
Tapioca MITM for web app analysisNov 2018networking-softwarelinux-software
#opendir: live malware, phishing, c2 webpagesNov 2018webweb-exploitsservicessocial-engineering
OpenResty: WebApp specialixed nginx engineNov 2018networking-softwarelinux-software
Vshadow: Abusing the Volume Shadow Service for Evasion, Persistence, and Active Directory Database Extraction – | bohops |Nov 2018windows-post-exploitation
AutoSploit = Shodan/Censys/Zoomeye + Metasploit - PenTestITNov 2018linux-software
Escape and Evasion Egressing Restricted Networks – Part 2Nov 2018exfiltrationevasion
FuzzySecurity | Windows Privilege Escalation FundamentalsNov 2018windows-post-exploitation
Web Application Penetration Testing Cheat SheetNov 2018vulnerability-scanningweb
PacketFence | Open Source NACNov 2018networking-softwaredetection
Bad-Pdf: malicious PDF file to steal windows hashesNov 2018windows-post-exploitation
The-Axer: msfvenom wrapperNov 2018evasionexfiltration
SpookFlare: Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasuresNov 2018evasionexfiltration




Elio Torrisi

The Netherlands