khwajaimran / LinuxLinks
All about Linux
☆38Updated 6 years ago
Alternatives and similar repositories for Linux
Users that are interested in Linux are comparing it to the libraries listed below
Sorting:
- Linux Security & Linux Hardening & Linux Management & Linux Configuration☆162Updated 3 years ago
- Security Audit Bash Script for Linux Systems☆53Updated 3 weeks ago
- I use all of scripts in this repository daily and schedule them to control my systems. Also, it includes all of my penetration tests scri…☆31Updated 3 years ago
- Things you can do with sed and awk☆156Updated 6 years ago
- A collection of sysadmin / DevOps / system architecture cheat sheets hosted on https://lzone.de☆320Updated last week
- ☆28Updated 2 months ago
- ☆106Updated 3 years ago
- HackerRank-LinuxShell Solutions☆45Updated 10 months ago
- Aliases and functions for the lazy penetration tester☆68Updated last year
- ☆15Updated 3 years ago
- The list of commonly used Redhat command for Linux System Administration☆10Updated 2 years ago
- Mastering Linux Shell Scripting_Andrew Mallett☆31Updated 6 years ago
- Docker Guide☆54Updated 3 years ago
- Awestome list of pentesting resources.☆120Updated last year
- This repository contains the files that provide the upload functionality in the IIS Server☆33Updated 4 years ago
- Install Nvidia drivers on Kali Linux safely in 10 easy steps.☆40Updated 6 years ago
- ☆99Updated last year
- A repository of useful bash script commands☆126Updated 2 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆16Updated 3 years ago
- Awesome Penetration Testing A collection of awesome penetration testing resources☆243Updated last year
- A list of the books that I am reading, with priorities.☆33Updated 3 years ago
- Kali Linux containers for bug bounty and CTFs☆11Updated 4 years ago
- devops scripts☆32Updated 8 years ago
- A collections of tutorials for junior system engineer☆49Updated 6 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆35Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆48Updated 4 years ago
- A collection of pentesting resources, tools, books, and libraries.☆26Updated 10 years ago
- Welcome To The World of DevOps. An ongoing & curated collection of awesome software, libraries, learning tutorials, tools and resources a…☆90Updated last year
- GhostNET script that will help you be safer on the cyber☆64Updated 4 years ago
- Collection of Combination of 👨🏻💻Ethical Hacking, 🐧Linux, Cyber security, 💰Bug Bounty, Penetration testing, Networking and more IT R…☆101Updated last year