opsdisk / the_cyber_plumbers_handbookLinks
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
☆2,710Updated 4 years ago
Alternatives and similar repositories for the_cyber_plumbers_handbook
Users that are interested in the_cyber_plumbers_handbook are comparing it to the libraries listed below
Sorting:
- Useful sed scripts & patterns.☆3,561Updated 3 years ago
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,219Updated 4 months ago
- Penetrum LLC opensource security tool list.☆653Updated 3 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,195Updated 5 months ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course☆549Updated 3 months ago
- A succinct cheat sheet for newbie linux coders and system administrators, documenting some of the more obscure and useful gems of linux l…☆336Updated 3 years ago
- Various tips & tricks☆3,549Updated last month
- Passive hostname, domain and IP lookup tool for non-robots☆1,642Updated last month
- Some stuff about Hardware Hacking☆606Updated last year
- HiddenVM — Use any desktop OS without leaving a trace.☆2,482Updated last year
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,244Updated last year
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,075Updated 2 years ago
- Download courses from khanacademy.org☆872Updated last year
- An ansible playbook to set up wireguard server.☆642Updated 3 years ago
- Learning Shodan through katas☆467Updated 5 years ago
- Best practices for segmentation of the corporate network of any company☆3,406Updated 4 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,161Updated 3 weeks ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆1,018Updated 4 months ago
- Example based guide to mastering GNU awk☆1,128Updated 6 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,602Updated 7 months ago
- ☆749Updated 2 years ago
- WebAssembly from Scratch: From FizzBuzz to DooM.☆1,546Updated 4 years ago
- Offensive Software Exploitation Course☆2,388Updated 2 years ago
- Dangerously fast DNS/network/port scanner☆920Updated 3 years ago
- A low power 1U Raspberry Pi cluster server for inexpensive colocation.☆736Updated 2 years ago
- Linux for Networking Professionals, published by Packt☆224Updated 5 months ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,365Updated 2 weeks ago
- A cheat sheet for if I am somehow incapacitated.☆1,056Updated 3 years ago
- Program to convert lines of text into a tree structure.☆1,198Updated last week
- Credentials Dumper for Linux using eBPF☆1,148Updated last year