opsdisk / the_cyber_plumbers_handbookLinks
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
☆2,717Updated 4 years ago
Alternatives and similar repositories for the_cyber_plumbers_handbook
Users that are interested in the_cyber_plumbers_handbook are comparing it to the libraries listed below
Sorting:
- Useful sed scripts & patterns.☆3,565Updated 3 years ago
- ☆751Updated 2 years ago
- Penetrum LLC opensource security tool list.☆653Updated 3 years ago
- A succinct cheat sheet for newbie linux coders and system administrators, documenting some of the more obscure and useful gems of linux l…☆337Updated 3 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,198Updated 6 months ago
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆1,595Updated last year
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,223Updated 5 months ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course☆549Updated 4 months ago
- Program to convert lines of text into a tree structure.☆1,198Updated last month
- An ansible playbook to set up wireguard server.☆642Updated 3 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,612Updated 8 months ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,937Updated last year
- Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 …☆1,018Updated 5 months ago
- Various tips & tricks☆3,566Updated 2 months ago
- Download courses from khanacademy.org☆876Updated last year
- Some stuff about Hardware Hacking☆609Updated last year
- A Unix-style personal search engine and web crawler for your digital footprint.☆1,376Updated 2 years ago
- Learning Shodan through katas☆467Updated 5 years ago
- HiddenVM — Use any desktop OS without leaving a trace.☆2,607Updated last year
- Offensive Software Exploitation Course☆2,390Updated 2 years ago
- Example based guide to mastering GNU awk☆1,128Updated 7 months ago
- Making SSH more convenient☆889Updated 2 years ago
- Resources for Application Security including Web, API, Android, iOS and Thick Client☆686Updated 2 years ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆1,025Updated 5 months ago
- A cheat sheet for if I am somehow incapacitated.☆1,057Updated 3 years ago
- Personal server configuration with k3s☆3,151Updated last week
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,369Updated last month
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,093Updated 2 years ago
- learn awk by example☆742Updated 4 years ago
- A tool for seeing your Internet latency. Try it at http://gfblip.appspot.com/☆1,754Updated 7 months ago