Documentation

Welcome to the Infosec House Documentation pages! Here you can quickly jump to a particular page.


Assets Management

Keep track of your inventory. You can't protect what you don't see.

Auditing

Stay in compliance with your audits.

Cheat Sheets

Defensive security cheat sheets.

Courses

Training and courses to master your craft.

Endpoint Protection

Protect your endpoints.

Firewalls

Defend the kingdom.

Forensics

Uncover the dirty little secrets of a recovered HDD, Image, malware, and more.

Honeypots

Deploy honeypots to catch the ops moves.

IDS/IPS

Intrusion Detection and Prevention Systems.

Defensive Security

Defensive cyber security tools & resources.

IOC

Indicators of compromise. Discover if you've been compromised.

Incident Response

Incident response tools, and resources when alarms pop off.

Malware

All the malware you can wish for to reverse engineer.

Mobile

Protect your mobile applications from being reverse engineered, and follow industry best practices.

Monitoring

Monitor your network, e-mail, packets, and infrastructure.

Operating Systems

Operating system's solely focused for defensive security teams.

Phishing

Tools and resources for analyzing phishing attacks.

Threat Intel

Discover where the threats begin.

Quiz

How to add interactive quizzes to your site.

Entertainment

Music and videos for your entertainment.

Music

Kick back relax and enjoy some entertainment.

Videos

Talks, live-streams, and presentations.

Icon Directory

Get familiar with the icons used to give quick additional details on each tool and resource.

C2

Command and control systems.

API

Tools and resources for pentesting against API endpoints.

Blogs

Reading material for offensive security researchers.

Bug Bounty

Test out your skills against other hackers. Get paid for finding vulnerabilities.

Cheat Sheets

Offensive security cheat sheets.

Cloud

Discover tools and resources dedicated to hacking cloud platforms.

Collaboration

Discover tools used for red team collaboration.

Courses

Training and courses to master your craft.

Cracking

Everything you need to crack all the hashes.

Cryptography

How great is your cryptography?

CTF

Offensive Security Capture the Flag Events.

Data Exfiltration

Exfiltrate the data, and test your DLP.

E-Mail

E-Mail pentesting tools and resources.

Evasion

Evade getting caught.

Exploits

Gather all your exploits needed to pop that box.

Firewalls

Attack the castle doors.

Hardware

Grab some of the most used hardware within the penetration testing industry.

Offensive Security

Offensive cyber security tools & resources.

Linux

Tools and resources for popping those linux boxes.

Mobile

Tools and resources for pentesting on mobile applications.

Network

Sniff the network. Modify the packets.

Operating Systems

Operating system's solely focused for offensive security teams.

Reconnaissance

Understand your target. Perform in-depth research and discover new attack surfaces.

Shells

Generating pre-built webshells to customizing your own.

Social Engineering

Manipulation techniques that exploits human error to gain private information, access, or valuables.

Vulnerability Scanners

Discover vulnerabilities fast, and automate some of the heavy loads.

Web Applications

Break that web application.

Windows

Microsoft Windows pentesting tools and resources.

Wireless

Discover tools and resources for exploiting Wi-Fi, bluetooth, RFID, and more.

Anonymity

Seek out technologies and methods of remaining anonymous in the day and age of mass surveillance.

Anti-Forensics

Destroy your data.

Burners

Everything for your temporary needs.

Communication

Protect your SMS messages, voice calls, and e-mails. Big brother is always watching.

Operation Security

Operation security tools & resources.

Operating Systems

Hardening your operating system.

Password & Access Management

Secure your passwords, secrets, and notes.

Search Engines

Discover alternative search engines that respect your privacy.

Analysis

Tools and scripts for analyzing data

Courses

Courses useful for both red & blue teams.

Default Passwords

The default password library.

Editors & Viewers

Tools for editing/viewing files.

Emulation

Emulate the adversary.

Purple Security

Purple security tools & resources.

Network

Network tools both offensive and defensive operations can utilize.

OSINT

Open-Source Intel. Get all the information needed for your target.

Reverse Engineering

Reverse engineering tools both offensive and defensive operations can utilize.

Write-Ups

Write-ups both offensive and defensive operations can utilize.

Secret Page

If you tune into twitch... You will understand.