j3ssie / the-practical-linux-hardening-guideLinks
This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.
☆19Updated 6 years ago
Alternatives and similar repositories for the-practical-linux-hardening-guide
Users that are interested in the-practical-linux-hardening-guide are comparing it to the libraries listed below
Sorting:
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 8 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- Simple script to download some missing tools in Kali☆33Updated 5 years ago
- TXT and PDF documents from the NSA☆15Updated 10 years ago
- Fast subdomains enumeration tool for penetration testers☆14Updated 5 years ago
- Intelligence gathering framework☆15Updated 10 years ago
- Free tools for mobile testing.☆38Updated 3 years ago
- Install popular tools used while pentesting & playing labs☆13Updated 4 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆55Updated 5 years ago
- Mobile Pentesting Guide (WIP)☆25Updated 5 years ago
- Simple script for the WHID injector - a rubberducky wifi☆115Updated last year
- Package manager for hackers built by hackers☆36Updated 7 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrato…☆66Updated 3 years ago
- Google Hack Database dork automatic tool.☆25Updated 8 years ago
- Facebook Basic Pro Scame Page☆16Updated 8 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- It is a tool that brings together exploits and news about security and vulnerabilities, with the intention of contributing to the open so…☆66Updated 6 years ago
- Airodump-ng WiFi Scan Visualizer☆61Updated 7 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆89Updated 6 years ago
- A list of universities with vulnerability disclosure policies☆13Updated 5 years ago
- Web Recon & Exploitation Tool.☆54Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆11Updated 5 years ago
- pen testing scripts☆12Updated 4 years ago
- Metasploit Framework☆29Updated 12 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Updated 3 years ago
- The hacker technical cheat sheet☆43Updated 5 months ago
- Scripts to set up Kali Linux with additional tools, and maintain them.☆68Updated 2 weeks ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆35Updated 8 years ago
- Hacking, pen-testing, and cyber-security related tools built with Python.☆35Updated 5 years ago
- Information gathering tool - OSINT☆37Updated 6 years ago