jessfraz / linux
Fork of Linux kernel for development (includes linux-security & linux-next).
☆14Updated last year
Alternatives and similar repositories for linux:
Users that are interested in linux are comparing it to the libraries listed below
- how-to monitor Docker hosts☆10Updated 8 years ago
- A port scanner written in PowerShell☆13Updated 3 years ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆15Updated 2 months ago
- some utilities written in applescript☆15Updated 13 years ago
- Training scenarios for cyber ranges☆11Updated 4 years ago
- Prototype program to decode a video file looking for exploits/malware.☆16Updated 4 years ago
- Checklists☆15Updated 8 years ago
- Python support package to parse IP and host inputs from network based tooling☆11Updated last year
- cool dockerfiles☆12Updated 8 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 10 months ago
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Updated 5 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Create machine images containing the Nessus vulnerability scanner☆11Updated last week
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Identifies Bluetooth Low-energy devices☆15Updated 4 years ago
- SIP hacking tools and scripts☆23Updated 4 years ago
- Example packet.proxy plugins.☆22Updated 4 years ago
- Created by Denis Podgurskiy via the GitHub Connector☆12Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- Automate Recon process using Shell Scripting☆11Updated 3 years ago
- Add your configs for tmux☆13Updated 2 years ago
- Manage the metasploit framework database☆16Updated 4 years ago
- Hourly Checked and Updated IP Ranges of AWS Servers☆19Updated 11 months ago
- Tool useful to discover services behind unknown ports☆13Updated 3 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago