Assets Management
Keep track of your inventory. You can't protect what you don't see.
Welcome to the Infosec House Documentation pages! Here you can quickly jump to a particular page.
Keep track of your inventory. You can't protect what you don't see.
Stay in compliance with your audits.
Defensive security cheat sheets.
Training and courses to master your craft.
Protect your endpoints.
Defend the kingdom.
Uncover the dirty little secrets of a recovered HDD, Image, malware, and more.
Deploy honeypots to catch the ops moves.
Intrusion Detection and Prevention Systems.
Defensive cyber security tools & resources.
Indicators of compromise. Discover if you've been compromised.
Incident response tools, and resources when alarms pop off.
All the malware you can wish for to reverse engineer.
Protect your mobile applications from being reverse engineered, and follow industry best practices.
Monitor your network, e-mail, packets, and infrastructure.
Operating system's solely focused for defensive security teams.
Tools and resources for analyzing phishing attacks.
Discover where the threats begin.
How to add interactive quizzes to your site.
Music and videos for your entertainment.
Kick back relax and enjoy some entertainment.
Talks, live-streams, and presentations.
Get familiar with the icons used to give quick additional details on each tool and resource.
Command and control systems.
Tools and resources for pentesting against API endpoints.
Reading material for offensive security researchers.
Test out your skills against other hackers. Get paid for finding vulnerabilities.
Offensive security cheat sheets.
Discover tools and resources dedicated to hacking cloud platforms.
Discover tools used for red team collaboration.
Training and courses to master your craft.
Everything you need to crack all the hashes.
How great is your cryptography?
Offensive Security Capture the Flag Events.
Exfiltrate the data, and test your DLP.
E-Mail pentesting tools and resources.
Evade getting caught.
Gather all your exploits needed to pop that box.
Attack the castle doors.
Grab some of the most used hardware within the penetration testing industry.
Offensive cyber security tools & resources.
Tools and resources for popping those linux boxes.
Tools and resources for pentesting on mobile applications.
Sniff the network. Modify the packets.
Operating system's solely focused for offensive security teams.
Understand your target. Perform in-depth research and discover new attack surfaces.
Generating pre-built webshells to customizing your own.
Manipulation techniques that exploits human error to gain private information, access, or valuables.
Discover vulnerabilities fast, and automate some of the heavy loads.
Break that web application.
Microsoft Windows pentesting tools and resources.
Discover tools and resources for exploiting Wi-Fi, bluetooth, RFID, and more.
Seek out technologies and methods of remaining anonymous in the day and age of mass surveillance.
Destroy your data.
Everything for your temporary needs.
Protect your SMS messages, voice calls, and e-mails. Big brother is always watching.
Operation security tools & resources.
Hardening your operating system.
Secure your passwords, secrets, and notes.
Discover alternative search engines that respect your privacy.
Tools and scripts for analyzing data
Courses useful for both red & blue teams.
The default password library.
Tools for editing/viewing files.
Emulate the adversary.
Purple security tools & resources.
Network tools both offensive and defensive operations can utilize.
Open-Source Intel. Get all the information needed for your target.
Reverse engineering tools both offensive and defensive operations can utilize.
Write-ups both offensive and defensive operations can utilize.
If you tune into twitch... You will understand.