devops scripts
☆33Dec 8, 2016Updated 9 years ago
Alternatives and similar repositories for scripts
Users that are interested in scripts are comparing it to the libraries listed below
Sorting:
- openvpn server configs☆15May 12, 2016Updated 9 years ago
- intrusion detection☆26Jun 14, 2017Updated 8 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- home! sweet home☆25Aug 23, 2019Updated 6 years ago
- Penetration Testing/Security Cheatsheets☆65Oct 31, 2015Updated 10 years ago
- openVAS with ansible☆21Apr 22, 2015Updated 10 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Use Tor for anonymous scanning with nmap☆93Jun 19, 2015Updated 10 years ago
- site source jivoi.github.io☆23Nov 7, 2022Updated 3 years ago
- your offsec knowledge☆485Oct 9, 2019Updated 6 years ago
- A curated list of awesome infosec resources.☆32May 31, 2015Updated 10 years ago
- Collection of linux sysadmin/devop interview questions☆18Aug 21, 2015Updated 10 years ago
- offsec batteries included☆1,605Mar 11, 2024Updated 2 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 6 months ago
- Sends public ip through e-mail. Command-line standalone.☆15Oct 16, 2016Updated 9 years ago
- open source society university☆32Jun 22, 2016Updated 9 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Feb 1, 2019Updated 7 years ago
- Useful commands for pentesting Linux and Windows systems☆14Jul 18, 2020Updated 5 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 9 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago
- Executables created while writing "Introduction to Manual Backdooring".☆81May 30, 2017Updated 8 years ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Feb 7, 2017Updated 9 years ago
- List of OSINT Capture The Flag platforms☆37Mar 6, 2026Updated 2 weeks ago
- ☆11May 31, 2019Updated 6 years ago
- A build system and primary set of packages for Termux.☆15Jan 16, 2022Updated 4 years ago
- PHP MYSQL☆18Feb 10, 2023Updated 3 years ago
- ☆57Sep 2, 2018Updated 7 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- Konsolenprogramme☆17Nov 25, 2021Updated 4 years ago
- zellularautomat☆17Nov 19, 2025Updated 4 months ago
- ☆14Jun 19, 2018Updated 7 years ago
- On behalf of my employer Phospore SI, I deployed an Elastic Stack within a Rancher environment using FileBeat and Logspout as log shipper…☆10Feb 13, 2018Updated 8 years ago
- SecTor - Not-So-Secret Agents: Deploying AI to Optimize Security Operations☆32Oct 15, 2025Updated 5 months ago