jivoi / devops_4_hackersLinks
DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)
☆15Updated 3 years ago
Alternatives and similar repositories for devops_4_hackers
Users that are interested in devops_4_hackers are comparing it to the libraries listed below
Sorting:
- ☆22Updated 8 years ago
- buffer overflow examples☆22Updated 7 years ago
- cool dockerfiles☆13Updated 9 years ago
- ☆33Updated 5 months ago
- ☆10Updated 3 years ago
- random scripts and utilities used for pentesting or R&D purposes☆9Updated last year
- home! sweet home☆23Updated 5 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 2 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- New Framework Red Team Operations☆18Updated 4 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- openvpn server configs☆14Updated 9 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 6 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated 2 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 4 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Updated 4 years ago
- Deepsearch leak database client, as an alternative for pwndb☆15Updated 2 years ago
- OSCP Focused Lab Pastable with some general Red Teaming Pastables.☆10Updated 5 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Simple utility to manage multiple ssh☆15Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆11Updated 3 years ago
- Scripts related to offensiveosint.io☆23Updated 5 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated 2 weeks ago