andresriancho / secure-ubuntu-desktopView external linksLinks
Maintain a list of tips and tricks to be used by Ubuntu users to secure their laptops.
☆66Dec 9, 2019Updated 6 years ago
Alternatives and similar repositories for secure-ubuntu-desktop
Users that are interested in secure-ubuntu-desktop are comparing it to the libraries listed below
Sorting:
- REST API client to consume w3af☆17May 22, 2023Updated 2 years ago
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 9 months ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Dec 11, 2025Updated 2 months ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Example packet.proxy plugins.☆22Jan 8, 2021Updated 5 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- Perl script to bruteforce SSH known_hosts files.☆25Jun 9, 2015Updated 10 years ago
- A Python-Based script designed to output stable and screen-scrapable lists of wireless networks☆15Jun 19, 2014Updated 11 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 8 years ago
- AWS Backup implementation in terraform☆13Feb 8, 2020Updated 6 years ago
- A capture-the-flag exercise based on data analysis challenges☆19Jan 30, 2020Updated 6 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Apr 15, 2014Updated 11 years ago
- Password scrambler - small util to make your easy passwords complicated!☆14Sep 14, 2017Updated 8 years ago
- ☆13Jul 22, 2017Updated 8 years ago
- Dart API docs☆19Jan 19, 2024Updated 2 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- A simple tool with the power of "Go" to find the hidden Vhosts defined at the server.☆19Jan 3, 2019Updated 7 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- Identify common attack paths to get Domain Administrator☆22Aug 20, 2019Updated 6 years ago
- Arch Linux pacman mirrorlist update utility☆18Jan 4, 2021Updated 5 years ago
- Port scanner in bash☆16Nov 8, 2013Updated 12 years ago
- A collaborative CTF framework written in Django.☆17Nov 6, 2014Updated 11 years ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- Improved version of David Elliott's SerialKDPProxy☆31Mar 19, 2019Updated 6 years ago
- Cross platform (i.e., Windows, Linux, Mac) assessment script. The script helps assess workstations for vulnerabilities and abnormalities.☆19Aug 14, 2015Updated 10 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆21Sep 19, 2019Updated 6 years ago
- ☆21Oct 3, 2019Updated 6 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- ☆21May 20, 2016Updated 9 years ago
- Probe_Spider is a Open Source Intelligence Tool made complete out of Python.☆27Apr 28, 2020Updated 5 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- test SSL/TLS clients how secure they are☆26Apr 9, 2021Updated 4 years ago
- Misc scripts and tools for WiFi☆106Jun 18, 2021Updated 4 years ago
- This Powershell script is designed to be run on a supported (by Microsoft) Windows host. It checks for the most common issues that will p…☆30Jul 16, 2021Updated 4 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Mar 8, 2019Updated 6 years ago