hackerhouse-opensource / shellcode
shellcode are codes designed to be injected into the memory space of another process during exploitation.
☆46Updated 3 years ago
Related projects: ⓘ
- Papers, presentations and documents from the team at Hacker House.☆49Updated 5 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆107Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- ☆22Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆17Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆14Updated 4 years ago
- Diebold Accuvote-TSx Election Machine Hacking☆38Updated 4 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆45Updated 4 years ago
- Advisories and Proofs of Concept by BlackArrow☆17Updated 5 months ago
- ☆11Updated 4 years ago
- ☆26Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆28Updated last year
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆24Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆17Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆19Updated 3 years ago
- Data EXfiltration TestER☆20Updated 5 years ago
- Shell hunter for AF☆34Updated 2 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆27Updated 3 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Updated 7 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆18Updated 4 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆59Updated 2 years ago
- pwncat windows c2 components☆17Updated 3 years ago
- ☆21Updated this week
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 5 years ago