Papers, presentations and documents from the team at Hacker House.
☆53Feb 2, 2026Updated 3 months ago
Alternatives and similar repositories for documents
Users that are interested in documents are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆51Feb 2, 2026Updated 3 months ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆23Feb 2, 2026Updated 3 months ago
- cve-2018-10933 libssh authentication bypass☆110Feb 2, 2026Updated 3 months ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆58Feb 2, 2026Updated 3 months ago
- AES-256 Microsoft Cryptography API Example Use.☆35Feb 2, 2026Updated 3 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆35Feb 2, 2026Updated 3 months ago
- Official Black Hat Arsenal Security Tools Repository☆12Aug 3, 2017Updated 8 years ago
- ☆23Mar 11, 2014Updated 12 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- A template-based tool for quickly constructing and running advanced Boolean searches on Google and Twitter/X for person-based OSINT inves…☆18Dec 2, 2024Updated last year
- A collection of awesome penetration testing resources, tools and other shiny things☆17Feb 11, 2017Updated 9 years ago
- This is a malware repo. Use them at your own risk. This is strictly for educational purposes only.☆12May 22, 2019Updated 7 years ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆110Feb 2, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Log4j2 CVE-2021-44228 revshell, ofc it suck!!☆18Dec 21, 2021Updated 4 years ago
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 8 years ago
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 5 months ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆142Feb 2, 2026Updated 3 months ago
- A curated list of awesome social engineering resources.☆14May 29, 2017Updated 8 years ago
- Random source codes☆25Dec 22, 2025Updated 4 months ago
- ☆20Aug 21, 2021Updated 4 years ago
- Attempt to reproduce paper for crack inspection in nuclear plants from video footage.(see references).☆14Dec 19, 2019Updated 6 years ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆139Feb 2, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Python-Based script designed to output stable and screen-scrapable lists of wireless networks☆15Jun 19, 2014Updated 11 years ago
- An efficient tool for search files, directories, and alternate data streams directly from NTFS image files.☆28Apr 14, 2026Updated last month
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆13Jan 13, 2024Updated 2 years ago
- A automate link building tool perfect for front-end development☆13Oct 2, 2017Updated 8 years ago
- ☆18Feb 16, 2024Updated 2 years ago
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆94Nov 6, 2025Updated 6 months ago
- ☆10May 30, 2021Updated 4 years ago
- A Binary Ninja plugin for WebAssembly.☆15Jun 30, 2020Updated 5 years ago
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Feb 11, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Nov 12, 2016Updated 9 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆60Mar 10, 2026Updated 2 months ago
- mirror of☆11Apr 4, 2018Updated 8 years ago
- Hackable website for teaching/training purposes. Includes my undergraduate thesis.☆14Mar 7, 2018Updated 8 years ago
- Collection of useful Ghidra utilities and references☆14Apr 9, 2024Updated 2 years ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆26Dec 1, 2022Updated 3 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 11 years ago