hackerhouse-opensource / documentsLinks
Papers, presentations and documents from the team at Hacker House.
☆52Updated 6 years ago
Alternatives and similar repositories for documents
Users that are interested in documents are comparing it to the libraries listed below
Sorting:
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆52Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- A collection of tools created for computer security research purposes.☆132Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- ☆24Updated 3 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆22Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Updated 5 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 4 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- Linux Rootkits (4.x Kernel)☆86Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 5 years ago
- Tools that trigger False Positive AV alerts☆51Updated 9 months ago
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆42Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Sp00fer blog post -☆25Updated 3 years ago
- SSH spreading made easy for red teams in a hurry☆57Updated last year
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year