hackerhouse-opensource / documents
Papers, presentations and documents from the team at Hacker House.
☆49Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for documents
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆46Updated 3 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆108Updated 4 years ago
- Diebold Accuvote-TSx Election Machine Hacking☆38Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- A collection of OSCE preparation resources.☆23Updated 5 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 6 years ago
- A collection of tools created for computer security research purposes.☆121Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Hashes of infamous malware☆25Updated last year
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆19Updated 2 years ago
- ☆16Updated 7 years ago
- Carving tool based in Radare2 & Yara☆15Updated 6 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Updated 7 years ago
- Miscellaneous analysis tools☆26Updated 9 years ago
- Exfiltration based on custom X509 certificates☆26Updated 8 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆18Updated 4 years ago
- Tools that trigger False Positive AV alerts☆43Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated 4 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆27Updated 5 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- Linux Rootkits (4.x Kernel)☆83Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆28Updated 3 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- windows-operating-system-archaeology @Enigma0x3 @subTee☆44Updated 7 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆13Updated 7 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago