opsdisk / the_cyber_plumbers_handbook
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
☆2,668Updated 3 years ago
Alternatives and similar repositories for the_cyber_plumbers_handbook
Users that are interested in the_cyber_plumbers_handbook are comparing it to the libraries listed below
Sorting:
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,104Updated 2 weeks ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,103Updated 6 months ago
- Penetrum LLC opensource security tool list.☆655Updated 3 years ago
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆1,537Updated 5 months ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,415Updated 5 months ago
- Real-time HTTP Intrusion Detection☆3,047Updated last year
- Dangerously fast DNS/network/port scanner☆901Updated 3 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,555Updated 2 months ago
- A list of cyber-chef recipes and curated links☆2,080Updated 11 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,882Updated last year
- Useful sed scripts & patterns.☆3,556Updated 3 years ago
- SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆3,662Updated 3 weeks ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,886Updated last year
- HiddenVM — Use any desktop OS without leaving a trace.☆2,435Updated 9 months ago
- SSH-MITM - ssh audits made simple☆1,382Updated 2 months ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,175Updated last week
- A collection of awesome security hardening guides, tools and other resources☆5,755Updated 7 months ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,808Updated last year
- Program to convert lines of text into a tree structure.☆1,198Updated last year
- Reverse proxies cheatsheet☆1,815Updated last year
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆1,032Updated last month
- Making SSH more convenient☆887Updated last year
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,350Updated 2 months ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course☆539Updated 2 years ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,353Updated last month
- jq for binary formats - tool, language and decoders for working with binary and text formats☆10,111Updated last week
- Example based guide to mastering GNU awk☆1,104Updated 3 weeks ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,419Updated 2 years ago
- An ansible playbook to set up wireguard server.☆640Updated 3 years ago
- Download courses from khanacademy.org☆855Updated 10 months ago