hackerhouse-opensource / documents
Papers, presentations and documents from the team at Hacker House.
☆50Updated 5 years ago
Alternatives and similar repositories for documents:
Users that are interested in documents are comparing it to the libraries listed below
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆47Updated 4 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆107Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Diebold Accuvote-TSx Election Machine Hacking☆39Updated 5 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 4 months ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 3 years ago
- ☆27Updated 3 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 2 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆14Updated 7 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago
- isodump - ISO dump utility☆40Updated 5 years ago
- Setup Kali XFCE version with some hi-dpi friendly style☆32Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- ☆49Updated 2 years ago
- ☆24Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- My Python Cookiecutter project template☆31Updated 2 years ago
- Custom pentesting tools☆25Updated 4 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆21Updated 6 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 7 years ago