opsdisk / the_cyber_plumbers_handbookLinks
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
☆2,670Updated 3 years ago
Alternatives and similar repositories for the_cyber_plumbers_handbook
Users that are interested in the_cyber_plumbers_handbook are comparing it to the libraries listed below
Sorting:
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,125Updated last month
- A collection of awesome security hardening guides, tools and other resources☆5,788Updated 8 months ago
- Useful sed scripts & patterns.☆3,557Updated 3 years ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,907Updated last year
- Penetrum LLC opensource security tool list.☆655Updated 3 years ago
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆1,075Updated 2 months ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,355Updated 3 months ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆970Updated last year
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,563Updated 3 months ago
- HiddenVM — Use any desktop OS without leaving a trace.☆2,445Updated 10 months ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,352Updated 2 months ago
- A pretty sweet vulnerability scanner☆4,132Updated 8 months ago
- My simple Swiss Army knife for http/https troubleshooting and profiling.☆3,791Updated 6 months ago
- SSH-MITM - ssh audits made simple☆1,385Updated 2 months ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆6,902Updated last year
- Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history.☆1,947Updated 3 weeks ago
- a drop-in replacement for Nmap powered by shodan.io☆3,042Updated last month
- Extract files from any kind of container formats☆2,315Updated this week
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,115Updated 7 months ago
- Passive hostname, domain and IP lookup tool for non-robots☆1,506Updated 3 weeks ago
- Offensive Software Exploitation Course☆2,370Updated 2 years ago
- Credentials Dumper for Linux using eBPF☆1,138Updated 8 months ago
- The corrective bash syntax highlighter☆4,684Updated 8 months ago
- List of Github repositories and articles with list of dorks for different search engines☆2,306Updated last month
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,240Updated last year
- 🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024☆18,657Updated last month
- Dangerously fast DNS/network/port scanner☆904Updated 3 years ago
- Making SSH more convenient☆887Updated last year
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course☆540Updated 2 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,924Updated 2 years ago