Pinned Repositories
6490725
solving the dependence
AD-MAP
AD-MAP
apscheduler
Task scheduling library for Python
attack-arsenal
A collection of red team and adversary emulation resources developed and released by MITRE.
Awesome-Red-Teaming
List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting point.
awesome-yara
A curated list of awesome YARA rules, tools, and people.
beagle_
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
bypass_disablefunc_via_LD_PRELOAD
bypass disable_functions via LD_PRELOA (no need /usr/sbin/sendmail)
capa
The FLARE team's open-source tool to identify capabilities in executable files.
cgPwn
A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks
houseoflore's Repositories
houseoflore/AD-MAP
AD-MAP
houseoflore/apscheduler
Task scheduling library for Python
houseoflore/attack-arsenal
A collection of red team and adversary emulation resources developed and released by MITRE.
houseoflore/Awesome-Red-Teaming
List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting point.
houseoflore/awesome-yara
A curated list of awesome YARA rules, tools, and people.
houseoflore/beagle_
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
houseoflore/bypass_disablefunc_via_LD_PRELOAD
bypass disable_functions via LD_PRELOA (no need /usr/sbin/sendmail)
houseoflore/capa
The FLARE team's open-source tool to identify capabilities in executable files.
houseoflore/chevrotain
lexer
houseoflore/CobaltStrikeParser
houseoflore/DaveShell
Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode
houseoflore/DrillMiniF
Neutering Sysmon via driver unload
houseoflore/EDRSandblast
houseoflore/ENCLOADER
USE OF Loading additional PE based on EXOCET
houseoflore/feroxbuster
A fast, simple, recursive content discovery tool written in Rust.
houseoflore/gensim
Topic Modelling for Humans
houseoflore/GoReSym
Go symbol recovery tool
houseoflore/HackTheYum
private study about yum
houseoflore/HXTool
HXTool is an extended user interface for the FireEye HX Endpoint product. HXTool can be installed on a dedicated server or on your physical workstation. HXTool provides additional features and capabilities over the standard FireEye HX web user interface. HXTool uses the fully documented REST API that comes with the FireEye HX for communication with
houseoflore/i
Tool for port forwarding & intranet proxy
houseoflore/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
houseoflore/PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
houseoflore/pysoxy
A small Socks5 Proxy Server in Python -202401201841
houseoflore/S1QL-Queries
ref
houseoflore/S1repo
houseoflore/signify
Module to generate and verify PE signatures
houseoflore/vti-dorks
Awesome VirusTotal Intelligence Search Queries
houseoflore/webdrivermanager
Python module to facilitate downloading and deploying WebDriver binaries for Chrome, Firefox, Opera & Edge
houseoflore/xzbot
notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
houseoflore/yum
[DEPRECATED] YUM package manager