In
Introduction
What?
Why?
How?
Creating malware
Attack tree
Cheatsheets
Windows malware
Attack tree
Notes
Veil
FatRat
Tools
Resources
Keylogger
Attack tree
Notes
Tools
Password recovery tool
Attack tree
Notes
Tools
Modifying code to bypass AV
Attack tree
Notes
Examples
Customise payload code using templates
Tools
Developments
Simple Windows trojan
Attack tree
Notes
Spoofing file extensions on Windows
Tools
macOS malware
Attack tree
Resources
Simple macOS trojan
Attack tree
Notes
Preview document icons
Tools
Linux malware
Attack tree
Notes
Bash backdoor
ZLogger
LazaGne
Execute & Report
Tools
Resources
Simple Linux trojan
Attack tree
Notes
Packaging
Creating An Android Trojan
Tools
Run payload on target device
Attack tree
Through
Introduction
What?
Why?
How?
Upgrade basic shell access to meterpreter/empire access
Attack tree
Notes
Cheatsheets
Maintaining access on Windows
Attack tree
Notes
Problems
Resources
Upload and execute using empire
Attack tree
Notes
Backdoor a Windows system process with empire
Attack tree
Notes
Privilege escalation on Windows
Attack tree
Notes
Cheatsheets
Maintaining access on macOS
Attack tree
Notes
Resources
Privilege escalation on macOS
Attack tree
Notes
Types
Existing exploits
The above method
Tools
Resources
Privilege escalation on Linux
Attack tree
Notes
Kernel exploits
Sudo exploits
SUID exploits
Capabilities exploits
Tools
Resources
Pivoting using meterpreter autoroute
Attack tree
Grove
Ty Myrddin Home
Unseen University
Improbability Blog
About
Contact
Please activate JavaScript to enable the search functionality.