myhackerhouse's profile picture. World-class ethical hacking services, training and software. Cutting-edge cybersecurity solutions, privacy and technical services.

hacker.house

@myhackerhouse

World-class ethical hacking services, training and software. Cutting-edge cybersecurity solutions, privacy and technical services.

ปักหมุด

Hands-On Hacking training course from Hacker House - learn how attackers target and breach networks using real-world applied hacking techniques. Have you ever wanted to learn how to hack? Try our FREE sample module, crack a server & learn new skills hacker.house/training


hacker.house รีโพสต์แล้ว
hackerfantastic's tweet image.

Wi-Fi Attack Training Manual (Version: 1.0 (Internal Training – Military & Public Security Use)) - 0x0.st/Kpqv.pdf


hacker.house รีโพสต์แล้ว

The #KnownSec "RESTRICTED – Military/Public Security Use Only" contained image teasers from files. Using OCR, translation and AI, I was able to reconstruct the 15 pages of "Wi-Fi Attack Training". There is reference to a 2019 0day (at the time) WiFi exploit DRAGONBLOOD.

hackerfantastic's tweet image. The #KnownSec "RESTRICTED – Military/Public Security Use Only" contained image teasers from files. Using OCR, translation and AI, I was able to reconstruct the 15 pages of "Wi-Fi Attack Training". There is reference to a 2019 0day (at the time) WiFi exploit DRAGONBLOOD.

hacker.house รีโพสต์แล้ว
Macro_Harder's tweet image.

hacker.house รีโพสต์แล้ว

Technical analysis of AIX 5.3L libc locale environment variable handling vulnerability that enables local privilege escalation to root. overs the buffer overflow mechanism, PowerPC shellcode construction, and exploitation technique targeting /usr/bin/su. deepwiki.com/hackerhouse-op…

hackerfantastic's tweet image. Technical analysis of AIX 5.3L libc locale environment variable handling vulnerability that enables local privilege escalation to root. overs the buffer overflow mechanism, PowerPC shellcode construction, and exploitation technique targeting /usr/bin/su. deepwiki.com/hackerhouse-op…
hackerfantastic's tweet image. Technical analysis of AIX 5.3L libc locale environment variable handling vulnerability that enables local privilege escalation to root. overs the buffer overflow mechanism, PowerPC shellcode construction, and exploitation technique targeting /usr/bin/su. deepwiki.com/hackerhouse-op…

hacker.house รีโพสต์แล้ว

Exploits for Unix variants with significant historical value and may still exist in specialized environments such as scientific computing facilities, ICS, and legacy envs. Coverage includes Cray UNICOS, SGI IRIX, Solaris, HP-UX, and SCO Unix systems. deepwiki.com/hackerhouse-op…

hackerfantastic's tweet image. Exploits for Unix variants with significant historical value and may still exist in specialized environments such as scientific computing facilities, ICS, and legacy envs. Coverage includes Cray UNICOS, SGI IRIX, Solaris, HP-UX, and SCO Unix systems. deepwiki.com/hackerhouse-op…

hacker.house รีโพสต์แล้ว

SignToolEx, a code-signing tool that enables the use of expired certificates for executable signing operations. deepwiki.com/hackerhouse-op…

hackerfantastic's tweet image. SignToolEx, a code-signing tool that enables the use of expired certificates for executable signing operations. deepwiki.com/hackerhouse-op…

Exploiting Windows Installers with SetupHijack: Race Conditions, UAC Bypasses, and Privilege Escalation hacker.house/blog/exploitin…

myhackerhouse's tweet image. Exploiting Windows Installers with SetupHijack: Race Conditions, UAC Bypasses, and Privilege Escalation hacker.house/blog/exploitin…

High-Risk Vulnerabilities in Microsoft Telnet MS-TNAP Implementation hacker.house/blog/critical-…

myhackerhouse's tweet image. High-Risk Vulnerabilities in Microsoft Telnet MS-TNAP Implementation hacker.house/blog/critical-…

hacker.house รีโพสต์แล้ว

Credential harvesting through the Microsoft Telnet NTLM Authentication Protocol (MS-TNAP). Implements a malicious Telnet server that exploits a protocol-level vulnerability in telnet.exe to capture NTLM authentication material via URIs. deepwiki.com/hackerhouse-op…

hackerfantastic's tweet image. Credential harvesting through the Microsoft Telnet NTLM Authentication Protocol (MS-TNAP). Implements a malicious Telnet server that exploits a protocol-level vulnerability in telnet.exe to capture NTLM authentication material via URIs. deepwiki.com/hackerhouse-op…

hacker.house รีโพสต์แล้ว

OffensiveLua is a collection of 20+ offensive security scripts written in Lua that perform red team operations through direct Windows API calls. The repo includes OffensiveLuaEmbedded.exe that embeds LuaJIT with advanced debugging capabilities. deepwiki.com/hackerhouse-op…

hackerfantastic's tweet image. OffensiveLua is a collection of 20+ offensive security scripts written in Lua that perform red team operations through direct Windows API calls. The repo includes OffensiveLuaEmbedded.exe that embeds LuaJIT with advanced debugging capabilities. deepwiki.com/hackerhouse-op…

hacker.house รีโพสต์แล้ว

145+ documented vulnerabilities, covers vulnerabilities from the 1990s (Cray UNICOS, SGI IRIX) through modern systems (2025 IIS exploits), providing both educational value and historical context for security researchers and penetration testers. deepwiki.com/hackerhouse-op…

hackerfantastic's tweet image. 145+ documented vulnerabilities, covers vulnerabilities from the 1990s (Cray UNICOS, SGI IRIX) through modern systems (2025 IIS exploits), providing both educational value and historical context for security researchers and penetration testers. deepwiki.com/hackerhouse-op…

hacker.house รีโพสต์แล้ว

I was exploiting time extensions in TCP recently and observed a peculiar behavior that the Linux kernel doesn't actually randomize timestamps when you tell it to, see - timecrime.c raw.githubusercontent.com/hackerhouse-op…


hacker.house รีโพสต์แล้ว

hacker.house รีโพสต์แล้ว

SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows installer and update processes. github.com/hackerhouse-op…

hackerfantastic's tweet image. SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows installer and update processes. github.com/hackerhouse-op…

hacker.house รีโพสต์แล้ว

Texas Instruments Code Composer Setup UAC Bypass. [0day]

hackerfantastic's tweet image. Texas Instruments Code Composer Setup UAC Bypass. [0day]

SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows installer and update processes to elevate privileges. github.com/hackerhouse-op…

hackerfantastic's tweet image. SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows installer and update processes to elevate privileges.    github.com/hackerhouse-op…


hacker.house รีโพสต์แล้ว

"Make sure to keep your computer up to date" ;)

hackerfantastic's tweet image. "Make sure to keep your computer up to date" ;)

hacker.house รีโพสต์แล้ว

SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows installer and update processes to elevate privileges. github.com/hackerhouse-op…

hackerfantastic's tweet image. SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows installer and update processes to elevate privileges.    github.com/hackerhouse-op…

Loading...

Something went wrong.


Something went wrong.