hackerhouse-opensource / toolsLinks
A collection of tools created for computer security research purposes.
☆125Updated 5 years ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆168Updated 2 months ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Papers, presentations and documents from the team at Hacker House.☆51Updated 5 years ago
- PowerShell payload generator☆117Updated 3 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 4 months ago
- A set of recipes useful in pentesting and red teaming scenarios☆143Updated last year
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆141Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆62Updated 5 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Some Pentest Tools. Install and keep up to date some pentesting tools. I used this to pass my OSCP exam.☆64Updated 3 years ago
- ☆78Updated 4 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- ☆150Updated last year
- ☆54Updated 6 years ago
- Basic C2 Server☆191Updated 3 years ago
- Simple & Customizable DNS Data Exfiltrator☆110Updated last year
- Repository and archive for Killing The Bear Gitbook☆83Updated last year
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- Open-Source Collection of Social Engineering Pretexts☆135Updated last year
- Posts about different topics☆36Updated last year
- ☆22Updated 6 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆65Updated last year
- A WLAN red team framework.☆156Updated 8 months ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated last week
- Some random tools I use for penetration testing☆90Updated 2 months ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 3 years ago