opsdisk / the_cyber_plumbers_handbook
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
☆2,647Updated 3 years ago
Alternatives and similar repositories for the_cyber_plumbers_handbook:
Users that are interested in the_cyber_plumbers_handbook are comparing it to the libraries listed below
- Useful sed scripts & patterns.☆3,557Updated 3 years ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,839Updated last year
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆6,832Updated last year
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,074Updated 2 months ago
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆1,532Updated 4 months ago
- 📖 An approachable introduction to Assembly.☆3,323Updated 2 months ago
- Program to convert lines of text into a tree structure.☆1,198Updated last year
- A collection of awesome security hardening guides, tools and other resources☆5,703Updated 6 months ago
- A succinct cheat sheet for newbie linux coders and system administrators, documenting some of the more obscure and useful gems of linux l…☆336Updated 3 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,537Updated last month
- HiddenVM — Use any desktop OS without leaving a trace.☆2,421Updated 8 months ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course☆536Updated 2 years ago
- A tool for seeing your Internet latency. Try it at http://gfblip.appspot.com/☆1,710Updated 6 months ago
- Various tips & tricks☆3,330Updated 3 weeks ago
- Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 …☆981Updated 2 years ago
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆10,067Updated 4 months ago
- A cheat sheet for if I am somehow incapacitated.☆1,056Updated 2 years ago
- Zui is a powerful desktop application for exploring and working with data. The official front-end to the Zed lake.☆1,836Updated this week
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,234Updated last year
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆1,789Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,768Updated 10 months ago
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.☆1,568Updated 2 years ago
- ☆539Updated 3 years ago
- Offensive Software Exploitation Course☆2,359Updated last year
- Credentials Dumper for Linux using eBPF☆1,136Updated 6 months ago
- Penetrum LLC opensource security tool list.☆652Updated 3 years ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆955Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,389Updated 2 years ago
- Simple (relatively) things allowing you to dig a bit deeper than usual.☆3,323Updated 3 weeks ago
- A low power 1U Raspberry Pi cluster server for inexpensive colocation.☆639Updated last year