Commands and Scripts to attack Linux and Servers
☆39May 1, 2025Updated 11 months ago
Alternatives and similar repositories for Linux-Attacks
Users that are interested in Linux-Attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27Nov 24, 2024Updated last year
- ☆11Nov 29, 2023Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Feb 27, 2026Updated last month
- hacking tools☆14Jan 29, 2023Updated 3 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Scraping LegiFrance naturalisation decrees for fun and OSINT profit☆11May 27, 2023Updated 2 years ago
- AppLocker hardening policies☆26Jul 26, 2018Updated 7 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- A collection of category-specific host files☆14Oct 18, 2025Updated 5 months ago
- a vulnerable GraphQL application☆20Dec 13, 2019Updated 6 years ago
- pascal compiler use lex and yacc: pascal->x86 assembler☆16Jun 12, 2017Updated 8 years ago
- This repository lists all active Microsoft domains | no URLs and no sub-domains | for the purpose of Whitelisting in various systems and …☆46Jan 8, 2026Updated 3 months ago
- ☆22Apr 4, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Some online tools for developers☆20Dec 25, 2025Updated 3 months ago
- This repository is created for personal use and added tools from my blog post.☆14Aug 27, 2023Updated 2 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆91Sep 12, 2023Updated 2 years ago
- LinOTP PAM module☆19Jul 21, 2023Updated 2 years ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated 2 years ago
- C# API for Nidhogg rootkit☆21Apr 25, 2024Updated last year
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆36May 18, 2020Updated 5 years ago
- Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.☆18Jul 26, 2024Updated last year
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 8 months ago
- GUI program to generate windows and SQL audit files for nessus☆14Jun 23, 2017Updated 8 years ago
- A simple python package to stretch audio files and change their speed☆12Feb 18, 2026Updated last month
- Anti-forensics tool Inspired by NSA's Marble framework.☆10Apr 17, 2025Updated 11 months ago
- Offensive Security Scripts (OSS) - Repository of random scripts I've written for offensive purposes.☆12Feb 21, 2025Updated last year
- Another Hardening Windows Tool☆50Aug 4, 2024Updated last year
- ☆14Updated this week
- Contains various Greek and Roman works of antiquity that were originally provided as part of the Perseus project (http://www.perseus.tuft…☆14Sep 27, 2013Updated 12 years ago
- A curated list of awesome tools, IDE integrations, frameworks, and other resources for developers working with Anthropic's Claude Code.☆34Oct 31, 2025Updated 5 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Educational proof-of-concept demonstrating DEP/NX bypass using hardware breakpoints, vectored exception handling, and instruction emulati…☆96Oct 17, 2025Updated 5 months ago
- Just some random stuff for AppLocker☆18Jan 30, 2019Updated 7 years ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- Shared lists of problem domains people may want to block with hosts files☆16Mar 3, 2025Updated last year
- Automate Sysmon Deployment and Configuration☆20Jul 26, 2024Updated last year
- Step by step implementation of FRI☆13Feb 9, 2025Updated last year
- A Collection of Wordlists for Penetration Testing☆35Mar 13, 2026Updated 3 weeks ago