jivoi / devops_4_hackers
DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)
☆13Updated 3 years ago
Alternatives and similar repositories for devops_4_hackers:
Users that are interested in devops_4_hackers are comparing it to the libraries listed below
- ☆20Updated 8 years ago
- buffer overflow examples☆22Updated 7 years ago
- ☆9Updated 2 years ago
- New Framework Red Team Operations☆17Updated 3 years ago
- Install popular tools used while pentesting & playing labs☆12Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- home! sweet home☆23Updated 5 years ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆26Updated 2 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Updated 2 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- Web application pentesting recon☆23Updated 4 years ago
- Yet another powerful payload encoder/decoder☆14Updated 3 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Intelligence gathering framework☆14Updated 9 years ago
- subdog is a subdomain enumeration tools, this tool collect number of different sources to create a list of root subdomains☆15Updated 2 months ago
- cool dockerfiles☆12Updated 8 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆16Updated 6 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- openvpn server configs☆13Updated 8 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 7 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- ☆34Updated 2 months ago
- ☆14Updated 4 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆11Updated 3 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆12Updated 3 years ago
- site source jivoi.github.io☆22Updated 2 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago