opsdisk / the_cyber_plumbers_handbook
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
☆2,621Updated 3 years ago
Alternatives and similar repositories for the_cyber_plumbers_handbook:
Users that are interested in the_cyber_plumbers_handbook are comparing it to the libraries listed below
- Useful sed scripts & patterns.☆3,557Updated 3 years ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,798Updated 10 months ago
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,013Updated 3 weeks ago
- A Unix-style personal search engine and web crawler for your digital footprint.☆1,372Updated last year
- Program to convert lines of text into a tree structure.☆1,200Updated last year
- ☆722Updated last year
- SSH-MITM - ssh audits made simple☆1,357Updated last week
- HiddenVM — Use any desktop OS without leaving a trace.☆2,393Updated 6 months ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆6,768Updated last year
- Better privacy without special software☆1,720Updated 6 months ago
- Extract files from any kind of container formats☆2,265Updated this week
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆1,518Updated 2 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,376Updated 2 years ago
- spy on the DNS queries your computer is making☆1,354Updated 5 months ago
- Credentials Dumper for Linux using eBPF☆1,128Updated 4 months ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course☆536Updated 2 years ago
- Making SSH more convenient☆887Updated last year
- A succinct cheat sheet for newbie linux coders and system administrators, documenting some of the more obscure and useful gems of linux l…☆337Updated 3 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,522Updated last year
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆867Updated 2 years ago
- Learn the skills required to sysadmin a remote Linux server from the commandline.☆3,396Updated 3 years ago
- Dangerously fast DNS/network/port scanner☆894Updated 2 years ago
- Learning Shodan through katas☆462Updated 4 years ago
- Download courses from khanacademy.org☆851Updated 6 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,056Updated 3 months ago
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.☆3,857Updated last year
- 🧪 Run common networking tests against any site.☆993Updated 2 weeks ago
- Penetrum LLC opensource security tool list.☆651Updated 2 years ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,342Updated 3 months ago
- An HTTP toolkit for security research.☆6,182Updated 2 weeks ago