opsdisk / the_cyber_plumbers_handbookLinks
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
☆2,727Updated 4 years ago
Alternatives and similar repositories for the_cyber_plumbers_handbook
Users that are interested in the_cyber_plumbers_handbook are comparing it to the libraries listed below
Sorting:
- Penetrum LLC opensource security tool list.☆655Updated 3 years ago
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,238Updated 5 months ago
- Useful sed scripts & patterns.☆3,565Updated 4 years ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course☆549Updated 5 months ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,200Updated 7 months ago
- A cheat sheet for if I am somehow incapacitated.☆1,056Updated 3 years ago
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆1,601Updated last year
- ☆752Updated 2 years ago
- A succinct cheat sheet for newbie linux coders and system administrators, documenting some of the more obscure and useful gems of linux l…☆337Updated 3 years ago
- spy on the DNS queries your computer is making☆1,377Updated last year
- HiddenVM — Use any desktop OS without leaving a trace.☆2,618Updated last year
- An ansible playbook to set up wireguard server.☆642Updated 3 years ago
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,247Updated 3 weeks ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆1,034Updated 5 months ago
- A Unix-style personal search engine and web crawler for your digital footprint.☆1,377Updated 2 years ago
- Download courses from khanacademy.org☆876Updated last year
- Example based guide to mastering GNU awk☆1,129Updated 7 months ago
- A collection of awesome security hardening guides, tools and other resources☆6,036Updated last year
- Some stuff about Hardware Hacking☆610Updated last year
- Learning Shodan through katas☆467Updated 5 years ago
- Better privacy without special software☆1,727Updated last year
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,110Updated 2 years ago
- Linux for Networking Professionals, published by Packt☆224Updated 7 months ago
- OOXML password remover☆595Updated 3 years ago
- SSH-MITM - ssh audits made simple☆1,420Updated 2 weeks ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,184Updated 2 months ago
- Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 …☆1,022Updated 6 months ago
- This is an old deactivated fork. Go to the current repo at livialima/linuxupskillchallenge☆1,668Updated last year
- Making SSH more convenient☆889Updated 2 years ago
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆899Updated 3 years ago