opsdisk / the_cyber_plumbers_handbookLinks
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
☆2,730Updated 4 years ago
Alternatives and similar repositories for the_cyber_plumbers_handbook
Users that are interested in the_cyber_plumbers_handbook are comparing it to the libraries listed below
Sorting:
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,263Updated 7 months ago
- Useful sed scripts & patterns.☆3,566Updated 4 years ago
- Penetrum LLC opensource security tool list.☆654Updated 3 years ago
- ☆756Updated 2 years ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course☆551Updated 6 months ago
- Some stuff about Hardware Hacking☆614Updated last year
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,201Updated 8 months ago
- HiddenVM — Use any desktop OS without leaving a trace.☆2,635Updated last year
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆1,612Updated last year
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆1,047Updated 7 months ago
- An ansible playbook to set up wireguard server.☆641Updated 3 years ago
- SSH-MITM - ssh audits made simple☆1,427Updated last week
- A succinct cheat sheet for newbie linux coders and system administrators, documenting some of the more obscure and useful gems of linux l…☆337Updated 4 years ago
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆900Updated 3 years ago
- Making SSH more convenient☆888Updated 2 years ago
- Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 …☆1,025Updated 7 months ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,394Updated 3 months ago
- Various tips & tricks☆3,743Updated last week
- Program to convert lines of text into a tree structure.☆1,200Updated 3 months ago
- Learning Shodan through katas☆468Updated 5 years ago
- Example based guide to mastering GNU awk☆1,136Updated last month
- Offensive Software Exploitation Course☆2,393Updated 2 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,189Updated 3 months ago
- Download courses from khanacademy.org☆883Updated last year
- A cheat sheet for if I am somehow incapacitated.☆1,056Updated 3 years ago
- Passive hostname, domain and IP lookup tool for non-robots☆1,767Updated last month
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,095Updated last year
- A collection of awesome security hardening guides, tools and other resources☆6,092Updated last week
- SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆4,080Updated 4 months ago
- Resources for Application Security including Web, API, Android, iOS and Thick Client☆690Updated 2 years ago