opsdisk / the_cyber_plumbers_handbookLinks
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
☆2,682Updated 3 years ago
Alternatives and similar repositories for the_cyber_plumbers_handbook
Users that are interested in the_cyber_plumbers_handbook are comparing it to the libraries listed below
Sorting:
- Penetrum LLC opensource security tool list.☆655Updated 3 years ago
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,159Updated 3 weeks ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course☆542Updated last week
- Useful sed scripts & patterns.☆3,560Updated 3 years ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,355Updated 3 months ago
- Offensive Software Exploitation Course☆2,374Updated 2 years ago
- Example based guide to mastering GNU awk☆1,113Updated 2 months ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,180Updated 2 months ago
- Some stuff about Hardware Hacking☆601Updated 11 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,575Updated 4 months ago
- Learning Shodan through katas☆465Updated 4 years ago
- A succinct cheat sheet for newbie linux coders and system administrators, documenting some of the more obscure and useful gems of linux l…☆337Updated 3 years ago
- ☆738Updated last year
- An ansible playbook to set up wireguard server.☆641Updated 3 years ago
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆1,553Updated 8 months ago
- A cheat sheet for if I am somehow incapacitated.☆1,054Updated 3 years ago
- Various tips & tricks☆3,470Updated last month
- Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 …☆996Updated last month
- Passive hostname, domain and IP lookup tool for non-robots☆1,553Updated last week
- SSH-MITM - ssh audits made simple☆1,394Updated last month
- WebAssembly from Scratch: From FizzBuzz to DooM.☆1,545Updated 4 years ago
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆893Updated 2 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,129Updated 8 months ago
- Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security…☆2,106Updated last year
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,365Updated 4 months ago
- Linux for Networking Professionals, published by Packt☆221Updated 2 months ago
- A Unix-style personal search engine and web crawler for your digital footprint.☆1,375Updated last year
- Better privacy without special software☆1,731Updated 11 months ago
- Program to convert lines of text into a tree structure.☆1,198Updated 2 years ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,629Updated this week