opsdisk / the_cyber_plumbers_handbookLinks
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
☆2,698Updated 3 years ago
Alternatives and similar repositories for the_cyber_plumbers_handbook
Users that are interested in the_cyber_plumbers_handbook are comparing it to the libraries listed below
Sorting:
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,190Updated 2 months ago
- Penetrum LLC opensource security tool list.☆656Updated 3 years ago
- Useful sed scripts & patterns.☆3,562Updated 3 years ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course☆545Updated last month
- Some stuff about Hardware Hacking☆603Updated last year
- Offensive Software Exploitation Course☆2,376Updated 2 years ago
- A succinct cheat sheet for newbie linux coders and system administrators, documenting some of the more obscure and useful gems of linux l…☆336Updated 3 years ago
- Example based guide to mastering GNU awk☆1,117Updated 4 months ago
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆1,579Updated 9 months ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,190Updated 3 months ago
- Download courses from khanacademy.org☆870Updated last year
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,992Updated last year
- Learning Shodan through katas☆466Updated 5 years ago
- Various tips & tricks☆3,495Updated this week
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆1,003Updated 2 months ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,363Updated 5 months ago
- SSH-MITM - ssh audits made simple☆1,406Updated this week
- Making SSH more convenient☆887Updated 2 years ago
- ☆740Updated last year
- Linux for Networking Professionals, published by Packt☆223Updated 3 months ago
- This is an old deactivated fork. Go to the current repo at livialima/linuxupskillchallenge☆1,682Updated 11 months ago
- Extract files from any kind of container formats☆2,350Updated this week
- spy on the DNS queries your computer is making☆1,372Updated last year
- Text, samples and website for my 'Effective Shell' series.☆738Updated this week
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,592Updated 5 months ago
- learn awk by example☆740Updated 4 years ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,210Updated 8 months ago
- Program to convert lines of text into a tree structure.☆1,198Updated 2 years ago
- SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆3,837Updated last week
- Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 …☆1,002Updated 2 months ago