hackerhouse-opensource / toolsLinks
A collection of tools created for computer security research purposes.
☆124Updated 5 years ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆164Updated last month
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆48Updated 4 years ago
- Papers, presentations and documents from the team at Hacker House.☆51Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- ☆150Updated last year
- PowerShell payload generator☆117Updated 3 years ago
- ☆53Updated 6 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆143Updated last year
- Basic C2 Server☆190Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 6 months ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 4 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Updated 3 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆128Updated 4 years ago
- ☆46Updated 4 years ago
- ☆20Updated 3 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- Simple & Customizable DNS Data Exfiltrator☆109Updated last year
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆65Updated last year
- Collection of extra pentest tools for Kali Linux☆105Updated 2 years ago
- Pentest stuff☆49Updated last year
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated last week
- Create visualization from Shodan query☆73Updated 4 years ago
- OSWE Preparation☆37Updated 6 years ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆171Updated 5 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆52Updated 2 years ago