🧊
    On the rockz
    Another infosec noobie | 
Training Dev @hackthebox 
- 
                  Hack The Box
- France
- https://xacone.github.io
- in/yazid-benjamaa
Highlights
Pinned Loading
- 
  
- 
  Eneio64-Driver-ExploitEneio64-Driver-Exploit PublicExploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W 
- 
  GetKeServiceDescriptorTableGetKeServiceDescriptorTable PublicKeServiceDescriptorTable retrieval from KiSystemCall64Shadow 
- 
  ReverseShellShellcodeTemplateReverseShellShellcodeTemplate Public archiveA simple reverse shell with dynamic-linking on runtime 
          Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
  If the problem persists, check the GitHub status page or contact support.


