opsdisk / the_cyber_plumbers_handbook
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
☆2,663Updated 3 years ago
Alternatives and similar repositories for the_cyber_plumbers_handbook:
Users that are interested in the_cyber_plumbers_handbook are comparing it to the libraries listed below
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,091Updated 3 months ago
- Useful sed scripts & patterns.☆3,557Updated 3 years ago
- Some stuff about Hardware Hacking☆588Updated 9 months ago
- WebAssembly from Scratch: From FizzBuzz to DooM.☆1,515Updated 3 years ago
- 📖 An approachable introduction to Assembly.☆3,341Updated 3 months ago
- Making SSH more convenient☆887Updated last year
- Example based guide to mastering GNU awk☆1,103Updated last week
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course☆539Updated 2 years ago
- How to systematically secure anything: a repository about security engineering☆10,072Updated 2 years ago
- SSH-MITM - ssh audits made simple☆1,382Updated last month
- Penetrum LLC opensource security tool list.☆654Updated 3 years ago
- Learning Shodan through katas☆466Updated 4 years ago
- Extract files from any kind of container formats☆2,305Updated this week
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,856Updated last year
- ☆731Updated last year
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆6,865Updated last year
- A cheat sheet for if I am somehow incapacitated.☆1,056Updated 2 years ago
- A Unix-style personal search engine and web crawler for your digital footprint.☆1,374Updated last year
- Better privacy without special software☆1,728Updated 9 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,678Updated 7 months ago
- learn awk by example☆738Updated 3 years ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,351Updated last month
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,203Updated 6 months ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,690Updated last year
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆1,537Updated 5 months ago
- OOXML password remover☆586Updated 2 years ago
- Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 …☆981Updated 2 years ago
- A collection of custom security tools for quick needs.☆3,194Updated last year
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,173Updated 2 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,095Updated 6 months ago