jessfraz / linuxLinks
Fork of Linux kernel for development (includes linux-security & linux-next).
☆14Updated 2 years ago
Alternatives and similar repositories for linux
Users that are interested in linux are comparing it to the libraries listed below
Sorting:
- Checklists☆17Updated 8 years ago
- how-to monitor Docker hosts☆10Updated 8 years ago
- cool dockerfiles☆13Updated 9 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- Application scanning component of OWASP PurpleTeam☆15Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated last year
- Training scenarios for cyber ranges☆11Updated 5 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated 2 weeks ago
- hacking tools awesome lists☆15Updated 7 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- New version of the buildkit repository☆9Updated 3 years ago
- A wrapper around ripgrep to check for various common patterns.☆13Updated 5 years ago
- Auto updating archive of my Twitter lists.☆15Updated 7 months ago
- It is a script written in Python that performs brute force on workers' payroll files through the use of their DNI (National Identity Docu…☆12Updated 4 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 4 years ago
- A curated list of Cloud Security techniques and tools☆29Updated 2 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Network based steganography based control channels and chat.☆8Updated 9 years ago
- Open Penetration Testing Bookmarks Collection☆19Updated 10 years ago
- A list of universities with vulnerability disclosure policies☆12Updated 5 years ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- Synack Red Team Firewall Script☆10Updated 10 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- Tips to protect your personal and company data☆28Updated 5 years ago
- Migrate team-managed project issues between two JIRA Cloud accounts☆11Updated 8 months ago
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆17Updated 3 years ago