hackerhouse-opensource / documentsLinks
Papers, presentations and documents from the team at Hacker House.
☆52Updated 6 years ago
Alternatives and similar repositories for documents
Users that are interested in documents are comparing it to the libraries listed below
Sorting:
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 8 years ago
- wordlists for password cracking☆28Updated 3 years ago
- ☆20Updated 5 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Linux Rootkits (4.x Kernel)☆86Updated 4 years ago
- Exploits developped by Outflank B.V. team members☆21Updated 8 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Updated 8 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 11 months ago
- ☆28Updated 6 years ago
- Data EXfiltration TestER☆21Updated 6 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 5 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- Tools that trigger False Positive AV alerts☆53Updated 10 months ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Updated 9 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- Sp00fer blog post -☆25Updated 3 years ago
- A collection of OSCE preparation resources.☆24Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- ☆25Updated 3 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆28Updated 2 weeks ago
- ☆16Updated 8 years ago