{"version":1,"pages":[{"id":"-MU9W3SvtkMIK4Q6BwaQ","title":"Exploit Pack","pathname":"/exploit-pack-manual-pages","siteSpaceId":"sitesp_lBKph","description":"Getting to know Exploit Pack in more detail"},{"id":"-MUD-dSFfw5zNf95mQ6t","title":"Installation and activation guide","pathname":"/exploit-pack-manual-pages/master/installation-guide","siteSpaceId":"sitesp_lBKph","description":"How to install and activate Exploit Pack - Step by step guide","breadcrumbs":[{"label":"Exploit Pack"}]},{"id":"-MUDFArwbo0DucFFTf4e","title":"First steps","pathname":"/exploit-pack-manual-pages/master/first-steps","siteSpaceId":"sitesp_lBKph","description":"Getting to know the interface","breadcrumbs":[{"label":"Exploit Pack"}]},{"id":"-MUDKtOWQpcBCHNBSYfu","title":"Running the network mapper","pathname":"/exploit-pack-manual-pages/master/running-the-network-mapper","siteSpaceId":"sitesp_lBKph","description":"Your first network scan using Exploit pack","breadcrumbs":[{"label":"Exploit Pack"}]},{"id":"-MUDMS_QFO0UVgaIytfN","title":"AutoPwn","pathname":"/exploit-pack-manual-pages/master/autopwn","siteSpaceId":"sitesp_lBKph","description":"How to use AutoPwn in Exploit Pack","breadcrumbs":[{"label":"Exploit Pack"}]},{"id":"-MUDMp6iqBw_OL1oMJWN","title":"UTF-8 Locator","pathname":"/exploit-pack-manual-pages/master/utf-8-locator","siteSpaceId":"sitesp_lBKph","description":"","breadcrumbs":[{"label":"Exploit Pack"}]},{"id":"-MUDNEI6ijzlSDvfnwqo","title":"Notepad","pathname":"/exploit-pack-manual-pages/master/notepad","siteSpaceId":"sitesp_lBKph","description":"","breadcrumbs":[{"label":"Exploit Pack"}]},{"id":"-MUDNUMzzf_7tRDUwoDY","title":"Reverse shell - One-liners","pathname":"/exploit-pack-manual-pages/master/reverse-shell-one-liners","siteSpaceId":"sitesp_lBKph","description":"We've got your back :-)","breadcrumbs":[{"label":"Exploit Pack"}]},{"id":"-MUDNxhzlB_oxNsE9ePD","title":"Hex Editor","pathname":"/exploit-pack-manual-pages/master/hex-editor","siteSpaceId":"sitesp_lBKph","description":"","breadcrumbs":[{"label":"Exploit Pack"}]},{"id":"-MUDOSxDjzHHfum4kK7N","title":"GDB Connector","pathname":"/exploit-pack-manual-pages/master/gdb-connector","siteSpaceId":"sitesp_lBKph","description":"Exploit Pack <-> GDB","breadcrumbs":[{"label":"Exploit Pack"}]},{"id":"-MUDP30hSMU1aCx8HtVk","title":"Log your actions","pathname":"/exploit-pack-manual-pages/master/log-your-actions","siteSpaceId":"sitesp_lBKph","description":"","breadcrumbs":[{"label":"Exploit Pack"}]},{"id":"-MUDPBGNikJVYSaj2VNC","title":"Exploits customization","pathname":"/exploit-pack-manual-pages/master/exploits-customization","siteSpaceId":"sitesp_lBKph","description":"The bread and butter of Exploit Pack","breadcrumbs":[{"label":"Exploit Pack"}]},{"id":"-MUDR1NemIcFpUD3vJe5","title":"Add a Proxy to Exploit Pack","pathname":"/exploit-pack-manual-pages/master/add-a-proxy-to-exploit-pack","siteSpaceId":"sitesp_lBKph","description":"Proxy your Exploit Pack traffic","breadcrumbs":[{"label":"Exploit Pack"}]},{"id":"-MUDRHimTUhLhPViwqK-","title":"Using Reverse Shells","pathname":"/exploit-pack-manual-pages/master/using-reverse-shells","siteSpaceId":"sitesp_lBKph","description":"","breadcrumbs":[{"label":"Exploit Pack"}]},{"id":"-MUDRoUPnazgTRqFnNhc","title":"XSS Agent - Tunnel","pathname":"/exploit-pack-manual-pages/master/xss-agent-tunnel","siteSpaceId":"sitesp_lBKph","description":"How to use the XSS Agent - Remote Control","breadcrumbs":[{"label":"Exploit Pack"}]},{"id":"9mSBzqjAohCkdPh6W5ib","title":"Advanced DLL Injections","pathname":"/exploit-pack-manual-pages/master/advanced-dll-injections","siteSpaceId":"sitesp_lBKph","description":"Execute DLL injections from Exploit Pack Framework.","breadcrumbs":[{"label":"Exploit Pack"}]},{"id":"1sgCOxYipbf0i6qD2lc1","title":"Sidekick Feature","pathname":"/exploit-pack-manual-pages/master/sidekick-feature","siteSpaceId":"sitesp_lBKph","breadcrumbs":[{"label":"Exploit Pack"}]},{"id":"-MUFDsCaIqqozQNgYUqZ","title":"Exploit Development I","pathname":"/exploit-pack-manual-pages/master/exploit-development-i","siteSpaceId":"sitesp_lBKph","description":"Your first baby steps","breadcrumbs":[{"label":"Exploit Pack"}]},{"id":"-MUFId64_TxzG2lMXweh","title":"Exploit Development II","pathname":"/exploit-pack-manual-pages/master/exploit-development-ii","siteSpaceId":"sitesp_lBKph","description":"Advanced buffer overflows","breadcrumbs":[{"label":"Exploit Pack"}]},{"id":"-MUPkL5WHI82J8XTQCMI","title":"Exploit Development III","pathname":"/exploit-pack-manual-pages/master/exploit-development-iii","siteSpaceId":"sitesp_lBKph","description":"A simple SEH exploit","breadcrumbs":[{"label":"Exploit Pack"}]},{"id":"rC1n6aV4tWJEmhO8ysIn","title":"Control Pack","pathname":"/exploit-pack-manual-pages/control-pack","siteSpaceId":"sitesp_lBKph","description":"Get to know Control Pack in more detail."},{"id":"lv5lz0Yb3z3cfrYZwGuC","title":"Installation  and activation guide","pathname":"/exploit-pack-manual-pages/control-pack/installation-guide","siteSpaceId":"sitesp_lBKph","description":"How to install and activate Control Pack - Step by step guide","breadcrumbs":[{"label":"Control Pack"}]},{"id":"CFvXAEZTmz7lEINGDvsV","title":"First Steps: Configure Control Pack","pathname":"/exploit-pack-manual-pages/control-pack/first-steps-configure-control-pack","siteSpaceId":"sitesp_lBKph","breadcrumbs":[{"label":"Control Pack"}]},{"id":"HXFFni4bQ4i7kW4tG3Ow","title":"First steps: Agents in Control Pack","pathname":"/exploit-pack-manual-pages/control-pack/first-steps-agents-in-control-pack","siteSpaceId":"sitesp_lBKph","breadcrumbs":[{"label":"Control Pack"}]},{"id":"FPpphGlKbbRJdWEKEo4q","title":"Launch your first agent","pathname":"/exploit-pack-manual-pages/control-pack/launch-your-first-agent","siteSpaceId":"sitesp_lBKph","breadcrumbs":[{"label":"Control Pack"}]},{"id":"Zn7rkIsckKj5UH9FiN8H","title":"Control Pack agent's code","pathname":"/exploit-pack-manual-pages/control-pack/control-pack-agents-code","siteSpaceId":"sitesp_lBKph","breadcrumbs":[{"label":"Control Pack"}]},{"id":"42vmxzxXlqr3sCBnrFQo","title":"Agent connection","pathname":"/exploit-pack-manual-pages/control-pack/agent-connection","siteSpaceId":"sitesp_lBKph","description":"Interact with an agent using Control Pack","breadcrumbs":[{"label":"Control Pack"}]},{"id":"LzixxFqz9XekGFBPGs4h","title":"Stage 1","pathname":"/exploit-pack-manual-pages/control-pack/stage-1","siteSpaceId":"sitesp_lBKph","description":"Where it all begins. Made for research, maximum stealth and stability.","breadcrumbs":[{"label":"Control Pack"}]},{"id":"IBWX3NUKMSt13kb2G77S","title":"Stage 2","pathname":"/exploit-pack-manual-pages/control-pack/stage-2","siteSpaceId":"sitesp_lBKph","description":"Get the power of Control Pack agents. Made for professional Penetration Testing and Red Teams.","breadcrumbs":[{"label":"Control Pack"}]},{"id":"MZvoyIOdRgyvzNd0kzJd","title":"The Watchdog","pathname":"/exploit-pack-manual-pages/control-pack/the-watchdog","siteSpaceId":"sitesp_lBKph","breadcrumbs":[{"label":"Control Pack"}]},{"id":"k9CQHSavCIcyWYAktXHZ","title":"Java Universal Agent","pathname":"/exploit-pack-manual-pages/control-pack/java-universal-agent","siteSpaceId":"sitesp_lBKph","description":"A Java shellcode agent that can be used as a post-exploitation module. It can be injected into a JVM or be run as a standalone binary using Java Launch4J.","breadcrumbs":[{"label":"Control Pack"}]},{"id":"yza9rjnO8spD971i83Hu","title":"Windows PE (DLL / PPL)","pathname":"/exploit-pack-manual-pages/control-pack/windows-pe-dll-ppl","siteSpaceId":"sitesp_lBKph","breadcrumbs":[{"label":"Control Pack"}]},{"id":"uTq4aAZ8696VJiO3xaRY","title":"Windows binary C++ Agent","pathname":"/exploit-pack-manual-pages/control-pack/windows-binary-c++-agent","siteSpaceId":"sitesp_lBKph","breadcrumbs":[{"label":"Control Pack"}]},{"id":"80JJcEhHOtdP34LtslyD","title":".NET Agent C#","pathname":"/exploit-pack-manual-pages/control-pack/.net-agent-c","siteSpaceId":"sitesp_lBKph","breadcrumbs":[{"label":"Control Pack"}]},{"id":"EA5mX7V7czHs5niHg5CF","title":"Browser Agent","pathname":"/exploit-pack-manual-pages/control-pack/browser-agent","siteSpaceId":"sitesp_lBKph","description":"How to use the browser agent within Control Pack.","breadcrumbs":[{"label":"Control Pack"}]},{"id":"s0pm9mikRZmOzZJRajYM","title":"VBS Agent","pathname":"/exploit-pack-manual-pages/control-pack/vbs-agent","siteSpaceId":"sitesp_lBKph","description":"Control Pack's VBS agent can be injected into an Excel/Word document. It lets you attach your own binary, and it's fully customizable (copy itself, bypass UAC, copy by email, Bypass AV/EDRs, etc)","breadcrumbs":[{"label":"Control Pack"}]},{"id":"6tvowmVx4wgxW4dP5HA6","title":"PowerShell Agent","pathname":"/exploit-pack-manual-pages/control-pack/powershell-agent","siteSpaceId":"sitesp_lBKph","breadcrumbs":[{"label":"Control Pack"}]},{"id":"3iUi3l3bAZsgv4OTwsXy","title":"Perl Agent","pathname":"/exploit-pack-manual-pages/control-pack/perl-agent","siteSpaceId":"sitesp_lBKph","breadcrumbs":[{"label":"Control Pack"}]},{"id":"8Ut2OBaSYFd3m183oSgn","title":".NET Profiler DLL Agent","pathname":"/exploit-pack-manual-pages/control-pack/.net-profiler-dll-agent","siteSpaceId":"sitesp_lBKph","description":"","breadcrumbs":[{"label":"Control Pack"}]},{"id":"TiLyjmDGye92f36p0sqs","title":"How to use the DLL + UnHooker Agent","pathname":"/exploit-pack-manual-pages/control-pack/how-to-use-the-dll-+-unhooker-agent","siteSpaceId":"sitesp_lBKph","description":"How to unhook DLLs with Control Pack.","breadcrumbs":[{"label":"Control Pack"}]},{"id":"1QPsS4bay4GJ69C1CBm2","title":".NET shell Agent","pathname":"/exploit-pack-manual-pages/control-pack/.net-shell-agent","siteSpaceId":"sitesp_lBKph","description":"Generate on Windows, a config file and a .NET agent in Control Pack.","breadcrumbs":[{"label":"Control Pack"}]},{"id":"tUIYFqV69OnmLs35Rw1u","title":"Python Shell Agent","pathname":"/exploit-pack-manual-pages/control-pack/python-shell-agent","siteSpaceId":"sitesp_lBKph","breadcrumbs":[{"label":"Control Pack"}]},{"id":"MR5ukYDvjTK4hQSLdI63","title":"Bash Agent","pathname":"/exploit-pack-manual-pages/control-pack/bash-agent","siteSpaceId":"sitesp_lBKph","breadcrumbs":[{"label":"Control Pack"}]},{"id":"2XT3bBOZZC91fw3AMiH3","title":".Net Profiler C# Agent","pathname":"/exploit-pack-manual-pages/control-pack/.net-profiler-c-agent","siteSpaceId":"sitesp_lBKph","breadcrumbs":[{"label":"Control Pack"}]},{"id":"h9OzRR0MLDcVRYvJzVo0","title":"Kernel Pack","pathname":"/exploit-pack-manual-pages/kernel-pack","siteSpaceId":"sitesp_lBKph","description":"Introduction and Overview"},{"id":"qeINdrh3FtQta06uvaQ6","title":"Installation and activation guide","pathname":"/exploit-pack-manual-pages/kernel-pack/installation-guide","siteSpaceId":"sitesp_lBKph","description":"How to install and activate Kernel Pack - Step by step guide","breadcrumbs":[{"label":"Kernel Pack"}]},{"id":"hNW9xKiqkrJGvkYT8ODt","title":"First Steps: Configure Kernel Pack","pathname":"/exploit-pack-manual-pages/kernel-pack/first-steps-configure-kernel-pack","siteSpaceId":"sitesp_lBKph","breadcrumbs":[{"label":"Kernel Pack"}]},{"id":"K5iylMjwfUKbBQ22fMao","title":"Generating a new Rootkit","pathname":"/exploit-pack-manual-pages/kernel-pack/generating-a-new-rootkit","siteSpaceId":"sitesp_lBKph","breadcrumbs":[{"label":"Kernel Pack"}]},{"id":"wA7WEoixnQJaBnfQpPop","title":"Deploying a Rootkit","pathname":"/exploit-pack-manual-pages/kernel-pack/deploying-a-rootkit","siteSpaceId":"sitesp_lBKph","breadcrumbs":[{"label":"Kernel Pack"}]},{"id":"iD0gVYT2aCc1r4Yjk2mu","title":"Process hiding","pathname":"/exploit-pack-manual-pages/kernel-pack/process-hiding","siteSpaceId":"sitesp_lBKph","breadcrumbs":[{"label":"Kernel Pack"}]},{"id":"pxiuikDjBRuQrJytpza5","title":"Other features","pathname":"/exploit-pack-manual-pages/kernel-pack/other-features","siteSpaceId":"sitesp_lBKph","breadcrumbs":[{"label":"Kernel Pack"}]},{"id":"lOJGIFSD67oQ1VlTyWFm","title":"EULA - Exploit Pack products","pathname":"/exploit-pack-manual-pages/eula-exploit-pack-products","siteSpaceId":"sitesp_lBKph"}]}