Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
β2,738Oct 27, 2021Updated 4 years ago
Alternatives and similar repositories for the_cyber_plumbers_handbook
Users that are interested in the_cyber_plumbers_handbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π¦π Awesome list of secrets in environment variables π₯οΈβ907Sep 21, 2022Updated 3 years ago
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output ofβ¦β2,228Jun 7, 2023Updated 2 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,971Jan 28, 2026Updated 2 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clouβ¦β2,808Apr 6, 2026Updated last week
- Arsenal is just a quick inventory and launcher for hacking programsβ3,713Nov 29, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,470Apr 12, 2026Updated last week
- All the deals for InfoSec related software/tools this Black Fridayβ4,348Nov 28, 2025Updated 4 months ago
- game of active directoryβ7,691Mar 12, 2026Updated last month
- Wiki to collect Red Team infrastructure hardening resourcesβ4,471Oct 1, 2025Updated 6 months ago
- Adversary Emulation Frameworkβ11,023Apr 10, 2026Updated last week
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,129Mar 12, 2024Updated 2 years ago
- Granular, Actionable Adversary Emulation for the Cloudβ2,295Updated this week
- Automate the creation of a lab environment complete with security tooling and logging best practicesβ4,946Jul 6, 2024Updated last year
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.β1,250Nov 21, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A collection of Azure AD/Entra tools for offensive and defensive security purposesβ2,588Feb 5, 2026Updated 2 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.β6,576Jan 18, 2026Updated 3 months ago
- A collection of awesome security hardening guides, tools and other resourcesβ6,264Mar 20, 2026Updated last month
- Network Analysis Toolβ3,351Apr 10, 2023Updated 3 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivyβs loader does this by β¦β745Aug 18, 2023Updated 2 years ago
- WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used agβ¦β1,649Aug 29, 2025Updated 7 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)β19,681Updated this week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.β10,237Sep 29, 2025Updated 6 months ago
- Useful sed scripts & patterns.β3,557Dec 15, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local labβ2,275Apr 12, 2024Updated 2 years ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment toolβ3,541Updated this week
- A list of cyber-chef recipes and curated linksβ2,200Jun 14, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.β2,878Aug 18, 2023Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ76,854Apr 8, 2026Updated last week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,367Sep 30, 2024Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.β11,793Apr 6, 2026Updated 2 weeks ago
- Red Teaming Tactics and Techniquesβ4,568Aug 22, 2024Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.β1,905Oct 29, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Fully automated homelab from empty disk to running services with a single command.β9,195Feb 27, 2026Updated last month
- Automating situational awareness for cloud penetration tests.β2,340Apr 12, 2026Updated last week
- Impacket is a collection of Python classes for working with network protocols.β15,631Apr 9, 2026Updated last week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)β8,450Mar 16, 2026Updated last month
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enablβ¦β27,896Apr 13, 2026Updated last week
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.β5,116Apr 5, 2026Updated 2 weeks ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.β2,729Jul 6, 2025Updated 9 months ago