opsdisk / the_cyber_plumbers_handbookLinks
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
☆2,708Updated 3 years ago
Alternatives and similar repositories for the_cyber_plumbers_handbook
Users that are interested in the_cyber_plumbers_handbook are comparing it to the libraries listed below
Sorting:
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,205Updated 3 months ago
- Example based guide to mastering GNU awk☆1,124Updated 5 months ago
- Useful sed scripts & patterns.☆3,561Updated 3 years ago
- ☆741Updated 2 years ago
- Various tips & tricks☆3,529Updated 3 weeks ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course☆549Updated 3 months ago
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,243Updated last year
- Learning Shodan through katas☆466Updated 5 years ago
- HiddenVM — Use any desktop OS without leaving a trace.☆2,473Updated last year
- Making SSH more convenient☆888Updated 2 years ago
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆1,583Updated 10 months ago
- A succinct cheat sheet for newbie linux coders and system administrators, documenting some of the more obscure and useful gems of linux l…☆336Updated 3 years ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,382Updated 7 months ago
- Penetrum LLC opensource security tool list.☆656Updated 3 years ago
- Offensive Software Exploitation Course☆2,384Updated 2 years ago
- Some stuff about Hardware Hacking☆603Updated last year
- Passive hostname, domain and IP lookup tool for non-robots☆1,633Updated last month
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,055Updated last year
- Download courses from khanacademy.org☆874Updated last year
- A collection of awesome security hardening guides, tools and other resources☆5,946Updated last year
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,155Updated last week
- SSH-MITM - ssh audits made simple☆1,409Updated last week
- An ansible playbook to set up wireguard server.☆643Updated 3 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,196Updated 5 months ago
- SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆3,906Updated last month
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,363Updated 6 months ago
- A low power 1U Raspberry Pi cluster server for inexpensive colocation.☆736Updated 2 years ago
- Program to convert lines of text into a tree structure.☆1,199Updated 2 years ago
- Tracking history of USB events on GNU/Linux☆1,168Updated 3 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,600Updated 7 months ago