hackerhouse-opensource / documentsLinks
Papers, presentations and documents from the team at Hacker House.
☆51Updated 5 years ago
Alternatives and similar repositories for documents
Users that are interested in documents are comparing it to the libraries listed below
Sorting:
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- Diebold Accuvote-TSx Election Machine Hacking☆39Updated 5 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- ☆51Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 4 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Linux Rootkits (4.x Kernel)☆83Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- isodump - ISO dump utility☆40Updated 6 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- ☆22Updated 4 years ago
- A collection of tools created for computer security research purposes.☆125Updated 5 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆109Updated 7 months ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 4 years ago
- Automated 802.1x Bypass☆86Updated 5 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago