j3ssie / the-practical-linux-hardening-guideLinks
This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.
☆19Updated 6 years ago
Alternatives and similar repositories for the-practical-linux-hardening-guide
Users that are interested in the-practical-linux-hardening-guide are comparing it to the libraries listed below
Sorting:
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 8 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆39Updated 2 years ago
- TXT and PDF documents from the NSA☆15Updated 10 years ago
- Simple script to download some missing tools in Kali☆34Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- WebHook for Red Team☆26Updated 4 years ago
- Google Hack Database dork automatic tool.☆24Updated 7 years ago
- pwndb is a tool that looks for leaked passwords from a dark web breach database given a user or domain.☆38Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆22Updated 3 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆44Updated 9 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆11Updated 4 years ago
- Simple script for the WHID injector - a rubberducky wifi☆111Updated last year
- Advance Google Dorker and Vulnerability Scanner☆48Updated 6 years ago
- steal cookies from website using xss☆13Updated 5 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Updated 4 years ago
- Easy brute forcing to whatever you want - Jose Pino☆64Updated 10 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrato…☆66Updated 3 years ago
- Godzilla is an automated scanner tool for bug hunters/pentesters that can scan website for vulnerabilities, Do Information gathering in N…☆30Updated 5 years ago
- Light Armoured Recon is a python script designed to automate passive recon. It automates execution of TheHarvester, whois, Robtex.com, Bu…☆38Updated 7 years ago
- Miscellaneous tools for BloodHound☆17Updated 3 years ago
- Install popular tools used while pentesting & playing labs☆13Updated 3 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆15Updated 5 years ago
- Intelligence gathering framework☆15Updated 10 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Updated 4 years ago
- Collect OSINT from git repositories☆20Updated 4 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆11Updated 6 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆34Updated 7 years ago