opsdisk / the_cyber_plumbers_handbookLinks
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
☆2,674Updated 3 years ago
Alternatives and similar repositories for the_cyber_plumbers_handbook
Users that are interested in the_cyber_plumbers_handbook are comparing it to the libraries listed below
Sorting:
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,147Updated 2 months ago
- SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆3,711Updated last week
- Extract files from any kind of container formats☆2,327Updated last week
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆6,913Updated last year
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆890Updated 2 years ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,352Updated 3 months ago
- Useful sed scripts & patterns.☆3,560Updated 3 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,123Updated 8 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,932Updated last year
- An HTTP toolkit for security research.☆6,993Updated 4 months ago
- Offensive Software Exploitation Course☆2,371Updated 2 years ago
- A semantic diff utility and library for tree-like files such as JSON, JSON5, XML, HTML, YAML, and CSV.☆2,411Updated last year
- HiddenVM — Use any desktop OS without leaving a trace.☆2,451Updated 11 months ago
- A collection of awesome security hardening guides, tools and other resources☆5,815Updated 8 months ago
- Connect like there is no firewall. Securely.☆1,700Updated 3 weeks ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,569Updated 3 months ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course☆541Updated 3 years ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆12,352Updated this week
- Better privacy without special software☆1,730Updated 11 months ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,820Updated last year
- Dangerously fast DNS/network/port scanner☆907Updated 3 years ago
- A Unix-style personal search engine and web crawler for your digital footprint.☆1,373Updated last year
- A cheat sheet for if I am somehow incapacitated.☆1,055Updated 2 years ago
- A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.☆10,477Updated 2 months ago
- A tool for seeing your Internet latency. Try it at http://gfblip.appspot.com/☆1,724Updated 2 months ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆973Updated this week
- Penetrum LLC opensource security tool list.☆655Updated 3 years ago
- a drop-in replacement for Nmap powered by shodan.io☆3,049Updated last month
- A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and…☆1,472Updated this week
- Reverse proxies cheatsheet☆1,822Updated last year