hackerhouse-opensource / tools
A collection of tools created for computer security research purposes.
☆122Updated 5 years ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆161Updated 3 weeks ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆47Updated 4 years ago
- Papers, presentations and documents from the team at Hacker House.☆51Updated 5 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 2 months ago
- ☆76Updated 4 years ago
- Creates and sends fake meeting invite☆59Updated 4 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆143Updated last year
- Tool to identify routers on the local LAN and paths to the Internet☆64Updated last year
- Repository and archive for Killing The Bear Gitbook☆83Updated last year
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Updated 3 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- cve-2018-10933 libssh authentication bypass☆109Updated 6 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆128Updated 4 years ago
- Commands used in Windows penetration tests☆52Updated 3 years ago
- ☆150Updated last year
- A bunch of my exploit development helper tools, collected in one place.☆141Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆62Updated 4 years ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆32Updated 7 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆38Updated 9 months ago
- ☆52Updated 6 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- An advanced graphical search engine for Exploit-DB☆118Updated 11 months ago
- A Linux enumeration script for Hack The Box☆189Updated 5 years ago
- Basic C2 Server☆190Updated 3 years ago
- PowerShell payload generator☆117Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆119Updated 6 months ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- Another Subdomain ENumeration Tool☆11Updated 2 years ago
- OSWE Preparation☆37Updated 5 years ago