DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)
☆18Aug 2, 2021Updated 4 years ago
Alternatives and similar repositories for devops_4_hackers
Users that are interested in devops_4_hackers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- ☆22Jun 28, 2016Updated 9 years ago
- openvpn server configs☆15May 12, 2016Updated 9 years ago
- home! sweet home☆25Aug 23, 2019Updated 6 years ago
- intrusion detection☆26Jun 14, 2017Updated 8 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Collection of linux sysadmin/devop interview questions☆18Aug 21, 2015Updated 10 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- VAMPY - Minimal tool for RAM dumping.☆10Jul 1, 2017Updated 8 years ago
- OSINT Framework☆19Mar 31, 2021Updated 4 years ago
- site source jivoi.github.io☆23Nov 7, 2022Updated 3 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- Use Tor for anonymous scanning with nmap☆93Jun 19, 2015Updated 10 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- Install popular tools used while pentesting & playing labs☆14Oct 8, 2021Updated 4 years ago
- your offsec knowledge☆485Oct 9, 2019Updated 6 years ago
- Deepfakes Software For All☆10Feb 21, 2020Updated 6 years ago
- just for fun ¯\_(ツ)_/¯☆278Sep 21, 2016Updated 9 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 6 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- SecTor - Not-So-Secret Agents: Deploying AI to Optimize Security Operations☆32Oct 15, 2025Updated 5 months ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57May 1, 2022Updated 3 years ago
- Tool for performing lots of DNS queries quickly☆18May 29, 2015Updated 10 years ago
- ☆11Sep 15, 2020Updated 5 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- Try Open WebUI on the Cloud!☆14Jan 3, 2025Updated last year
- A comprehensive VS Code snippet collection for Jinja2 and Django template engines.☆14Mar 13, 2026Updated last week
- ☆17May 29, 2015Updated 10 years ago
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 10 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆49May 1, 2022Updated 3 years ago
- Chase subdomains by parsing the results of Google and Yandex search results☆15Sep 29, 2023Updated 2 years ago
- Python for Security is the home of all open source Python projects that can integrate with Microsoft Technologies.☆13Jan 10, 2022Updated 4 years ago
- Python - Hello, World☆10Oct 28, 2025Updated 4 months ago
- RPG / RolePlay framework for https://nanos.world☆11Oct 13, 2022Updated 3 years ago
- Collection of my talks and workshops about hacking & cybersecurity☆28Feb 28, 2025Updated last year
- Free Cybersecurity tutorials for beginners with 351 interactive lessons. Easy-to-follow programming guides with hands-on practice exercis…☆32Oct 23, 2025Updated 5 months ago
- read the docs version of risk management☆27Mar 6, 2023Updated 3 years ago