Papers, presentations and documents from the team at Hacker House.
☆53Feb 2, 2026Updated 2 months ago
Alternatives and similar repositories for documents
Users that are interested in documents are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of tools created for computer security research purposes.☆139Feb 2, 2026Updated 2 months ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆26Feb 2, 2026Updated 2 months ago
- exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House☆468Feb 22, 2026Updated last month
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆23Feb 2, 2026Updated 2 months ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆57Feb 2, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- AES-256 Microsoft Cryptography API Example Use.☆35Feb 2, 2026Updated 2 months ago
- Github profile☆21Feb 2, 2026Updated 2 months ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated 2 months ago
- Official Black Hat Arsenal Security Tools Repository☆12Aug 3, 2017Updated 8 years ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Feb 11, 2017Updated 9 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- This is a malware repo. Use them at your own risk. This is strictly for educational purposes only.☆12May 22, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆111Feb 2, 2026Updated 2 months ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- Log4j2 CVE-2021-44228 revshell, ofc it suck!!☆18Dec 21, 2021Updated 4 years ago
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 7 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆143Feb 2, 2026Updated 2 months ago
- A curated list of awesome social engineering resources.☆14May 29, 2017Updated 8 years ago
- Patching "signtool.exe" to accept expired certificates for code-signing.☆343Feb 2, 2026Updated 2 months ago
- Random source codes☆26Dec 22, 2025Updated 3 months ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆20Aug 21, 2021Updated 4 years ago
- Attempt to reproduce paper for crack inspection in nuclear plants from video footage.(see references).☆14Dec 19, 2019Updated 6 years ago
- A Python-Based script designed to output stable and screen-scrapable lists of wireless networks☆15Jun 19, 2014Updated 11 years ago
- An efficient tool for search files, directories, and alternate data streams directly from NTFS image files.☆28Mar 30, 2026Updated last week
- ☆16Jul 7, 2020Updated 5 years ago
- A automate link building tool perfect for front-end development☆13Oct 2, 2017Updated 8 years ago
- ☆17Feb 16, 2024Updated 2 years ago
- ☆11May 30, 2021Updated 4 years ago
- A Binary Ninja plugin for WebAssembly.☆15Jun 30, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Feb 11, 2022Updated 4 years ago
- mirror of☆11Apr 4, 2018Updated 8 years ago
- Collection of useful Ghidra utilities and references☆14Apr 9, 2024Updated 2 years ago
- A curated list of awesome infosec resources.☆32May 31, 2015Updated 10 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- A template for projects using both libPeConv and MS Detours☆16Oct 5, 2025Updated 6 months ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago