About Home Explore Projects


Image 1
Bypassing Sandbox Providers For Email Delivery.
Image 2
Dump Outlook Emails From Compromised Machines with tokens.
Image 3
WiFi - Compromising Enterprise Networks Part-1.
Image 4
Physical Network Implants for Remote Testing.
Image 5
Configure - Simple and Quick HTTPS site Hosting For Phishing.
Image 6
WiFi - Compromising Enterprise Networks Part-2.
Image 6
Using Domain Fronting to Hide Your Malicious Site.
Image 6
Attacking Cisco Devices in internal network.
Image 6
Bypass Network Restrictions With DNS Tunneling