hackerhouse-opensource / documents
Papers, presentations and documents from the team at Hacker House.
☆49Updated 5 years ago
Alternatives and similar repositories for documents:
Users that are interested in documents are comparing it to the libraries listed below
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆46Updated 4 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆107Updated 4 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated last month
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Diebold Accuvote-TSx Election Machine Hacking☆39Updated 4 years ago
- DC540 hacking challenge 0x00005b.☆16Updated last year
- Exfiltration based on custom X509 certificates☆26Updated 10 months ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 3 months ago
- isodump - ISO dump utility☆39Updated 5 years ago
- A collection of OSCE preparation resources.☆23Updated 5 years ago
- ☆15Updated 3 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆48Updated 6 years ago
- ☆22Updated 4 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆27Updated 8 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Miscellaneous analysis tools☆26Updated 9 years ago
- Skeleton project for your own GRUB-based bootkit☆15Updated 5 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year
- ☆27Updated last week
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆14Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Autowin is a framework that helps organizations simulate custom attack scenarios in order to improve detection and response capabilities.☆19Updated 3 years ago
- tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-…☆14Updated 6 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆60Updated 7 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago