Papers, presentations and documents from the team at Hacker House.
☆53Feb 2, 2026Updated last month
Alternatives and similar repositories for documents
Users that are interested in documents are comparing it to the libraries listed below
Sorting:
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆23Feb 2, 2026Updated last month
- AES-256 Microsoft Cryptography API Example Use.☆35Feb 2, 2026Updated last month
- Github profile☆21Feb 2, 2026Updated last month
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- ☆23Mar 11, 2014Updated 12 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Feb 11, 2017Updated 9 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- This is a malware repo. Use them at your own risk. This is strictly for educational purposes only.☆12May 22, 2019Updated 6 years ago
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 3 months ago
- Fork this repo! Do a Pull Request! As many times as you want! Learn the ins and outs of how to contribute to GitHub! Make your mistakes h…☆14Jun 21, 2024Updated last year
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆143Feb 2, 2026Updated last month
- A curated list of awesome social engineering resources.☆14May 29, 2017Updated 8 years ago
- Patching "signtool.exe" to accept expired certificates for code-signing.☆342Feb 2, 2026Updated last month
- Random source codes☆26Dec 22, 2025Updated 2 months ago
- Attempt to reproduce paper for crack inspection in nuclear plants from video footage.(see references).☆14Dec 19, 2019Updated 6 years ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆139Feb 2, 2026Updated last month
- A Python-Based script designed to output stable and screen-scrapable lists of wireless networks☆15Jun 19, 2014Updated 11 years ago
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Oct 18, 2021Updated 4 years ago
- ☆16Jul 7, 2020Updated 5 years ago
- A automate link building tool perfect for front-end development☆13Oct 2, 2017Updated 8 years ago
- Threatbutt Suite☆37Jun 3, 2015Updated 10 years ago
- ☆11May 30, 2021Updated 4 years ago
- A Binary Ninja plugin for WebAssembly.☆15Jun 30, 2020Updated 5 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated last month
- mirror of☆11Apr 4, 2018Updated 7 years ago
- Sample libraries to be used with IAT Patcher☆37Oct 1, 2022Updated 3 years ago
- A collection of BBRF agents that can be deployed to AWS lambda☆24Nov 17, 2024Updated last year
- Collection of useful Ghidra utilities and references☆14Apr 9, 2024Updated last year
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆26Dec 1, 2022Updated 3 years ago
- A curated list of awesome infosec resources.☆32May 31, 2015Updated 10 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- ☆10Aug 16, 2019Updated 6 years ago