hackerhouse-opensource / documents
Papers, presentations and documents from the team at Hacker House.
☆51Updated 5 years ago
Alternatives and similar repositories for documents
Users that are interested in documents are comparing it to the libraries listed below
Sorting:
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆47Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Diebold Accuvote-TSx Election Machine Hacking☆39Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 5 months ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆109Updated 5 months ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- My Python Cookiecutter project template☆32Updated 2 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 8 years ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆23Updated 5 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 7 months ago
- isodump - ISO dump utility☆40Updated 5 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Updated 7 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year
- Random Hashcat Scrips☆28Updated 7 months ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆14Updated 7 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Updated 4 years ago
- Autowin is a framework that helps organizations simulate custom attack scenarios in order to improve detection and response capabilities.☆20Updated 4 years ago
- Web Filter External Enumeration Tool (WebFEET)☆76Updated 10 years ago
- ☆22Updated 4 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Updated 5 years ago