Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
โ2,736Oct 27, 2021Updated 4 years ago
Alternatives and similar repositories for the_cyber_plumbers_handbook
Users that are interested in the_cyber_plumbers_handbook are comparing it to the libraries listed below
Sorting:
- ๐ฆ๐ Awesome list of secrets in environment variables ๐ฅ๏ธโ902Sep 21, 2022Updated 3 years ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clouโฆโ2,804Sep 17, 2024Updated last year
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output ofโฆโ2,225Jun 7, 2023Updated 2 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.โ5,925Jan 28, 2026Updated last month
- Arsenal is just a quick inventory and launcher for hacking programsโ3,698Nov 29, 2024Updated last year
- Automate the creation of a lab environment complete with security tooling and logging best practicesโ4,909Jul 6, 2024Updated last year
- game of active directoryโ7,505Updated this week
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockโ7,111Mar 12, 2024Updated last year
- Wiki to collect Red Team infrastructure hardening resourcesโ4,454Oct 1, 2025Updated 5 months ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password ๐ก๏ธโ6,416Dec 20, 2025Updated 2 months ago
- All the deals for InfoSec related software/tools this Black Fridayโ4,343Nov 28, 2025Updated 3 months ago
- A collection of awesome security hardening guides, tools and other resourcesโ6,203Jan 20, 2026Updated last month
- Granular, Actionable Adversary Emulation for the Cloudโ2,272Updated this week
- A list of cyber-chef recipes and curated linksโ2,188Jun 14, 2024Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.โ6,511Jan 18, 2026Updated last month
- Adversary Emulation Frameworkโ10,798Updated this week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.โ10,158Sep 29, 2025Updated 5 months ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposesโ2,535Feb 5, 2026Updated last month
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.โ1,251Nov 21, 2025Updated 3 months ago
- Network Analysis Toolโ3,333Apr 10, 2023Updated 2 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fโฆโ4,352Sep 30, 2024Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)โ19,424Updated this week
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local labโ2,260Apr 12, 2024Updated last year
- Automating situational awareness for cloud penetration tests.โ2,303Updated this week
- ScareCrow - Payload creation framework designed around EDR bypass.โ2,876Aug 18, 2023Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.โ2,695Jul 6, 2025Updated 8 months ago
- Fully automated homelab from empty disk to running services with a single command.โ9,129Feb 27, 2026Updated last week
- A swiss army knife for pentesting networksโ9,086Dec 6, 2023Updated 2 years ago
- WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used agโฆโ1,637Aug 29, 2025Updated 6 months ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment toolโ3,490Feb 12, 2026Updated 3 weeks ago
- Useful sed scripts & patterns.โ3,562Dec 15, 2021Updated 4 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.โ1,900Oct 29, 2025Updated 4 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)โ8,358Dec 6, 2025Updated 3 months ago
- Red Teaming Tactics and Techniquesโ4,501Aug 22, 2024Updated last year
- Sandman is a NTP based backdoor for hardened networks.โ815Mar 31, 2024Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivyโs loader does this by โฆโ744Aug 18, 2023Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.โ1,475Oct 8, 2022Updated 3 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accountsโ1,371Oct 22, 2025Updated 4 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.โ5,064Feb 25, 2026Updated last week