jivoi / devops_4_hackers
DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)
☆14Updated 3 years ago
Alternatives and similar repositories for devops_4_hackers:
Users that are interested in devops_4_hackers are comparing it to the libraries listed below
- buffer overflow examples☆22Updated 7 years ago
- ☆21Updated 8 years ago
- home! sweet home☆23Updated 5 years ago
- ☆9Updated 3 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Hand list of Powershell commands frequently used during penetration tests☆13Updated 6 years ago
- Write-Ups for TryHackMe☆22Updated 3 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- A web front-end for password cracking and analytics☆16Updated 6 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 2 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 7 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆20Updated last year
- ☆33Updated 2 months ago
- Tool to automatically email results from your Python scripts to your inbox as text or as a file attachment, storing the sender email acco…☆7Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Intelligence gathering framework☆14Updated 9 years ago
- only for 31337☆22Updated 8 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- Payloads and Lists☆21Updated 5 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Updated 3 years ago
- New Framework Red Team Operations☆17Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago