hackerhouse-opensource / documentsLinks
Papers, presentations and documents from the team at Hacker House.
☆52Updated 6 years ago
Alternatives and similar repositories for documents
Users that are interested in documents are comparing it to the libraries listed below
Sorting:
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 5 years ago
- A collection of tools created for computer security research purposes.☆134Updated 5 years ago
- Tools that trigger False Positive AV alerts☆53Updated last year
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- ☆26Updated 3 years ago
- Sp00fer blog post -☆24Updated 3 years ago
- Local Privilege Escalation Miner☆31Updated 3 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- Collection of red machine learning projects☆41Updated 4 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- wordlists for password cracking☆28Updated 3 years ago
- A powershell parser for https://github.com/ufrisk/MemProcFS☆44Updated 4 years ago
- isodump - ISO dump utility☆41Updated 6 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆60Updated 3 years ago
- Automated 802.1x Bypass☆86Updated 5 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- ☆28Updated 6 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Updated 9 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Updated 5 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- ☆27Updated 3 years ago