Linux Security and Hardening Security Guide
☆215Sep 17, 2023Updated 2 years ago
Alternatives and similar repositories for Linux-Security-and-Hardening-Security-Guide
Users that are interested in Linux-Security-and-Hardening-Security-Guide are comparing it to the libraries listed below
Sorting:
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- Wireshark RDP resources☆221Jun 2, 2025Updated 9 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- Search this list of OSINT Practitioners and learn about OSINT, it includes numerous, blogs and tutorials.☆101Oct 12, 2025Updated 4 months ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆322Aug 8, 2024Updated last year
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆18Mar 13, 2024Updated last year
- ☆138Apr 20, 2023Updated 2 years ago
- Everything related to Linux Forensics☆717Jul 13, 2023Updated 2 years ago
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆17Jan 22, 2026Updated last month
- ☆11Aug 31, 2023Updated 2 years ago
- Retrieve AD accounts description and search for password in it☆82Jul 21, 2022Updated 3 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 2 years ago
- Scripts and piece of codes used for Active Directory configuration☆83Feb 14, 2023Updated 3 years ago
- Internal Network Penetration Test Playbook☆20Jul 13, 2021Updated 4 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Apr 3, 2024Updated last year
- ☆13Jan 19, 2023Updated 3 years ago
- ☆1,073May 18, 2024Updated last year
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Sep 8, 2022Updated 3 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆784Jun 23, 2023Updated 2 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated last year
- ☆109Feb 21, 2023Updated 3 years ago
- Tools & Interesting Things for RedTeam Ops☆2,258Feb 10, 2026Updated 3 weeks ago
- ☆81May 27, 2023Updated 2 years ago
- ☆47Feb 11, 2023Updated 3 years ago
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆3,183Feb 23, 2026Updated 2 weeks ago
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆917Aug 30, 2023Updated 2 years ago
- Hacking and Cyber Security Ebooks | For More Visit -☆86Oct 12, 2019Updated 6 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Jun 15, 2023Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Aug 6, 2022Updated 3 years ago
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆304Nov 13, 2021Updated 4 years ago
- MS Graph Commands and Tools for Blue Teamers☆51Feb 4, 2026Updated last month
- ☆61Jun 24, 2023Updated 2 years ago
- Algunos #OSINT_TIPS para sus excelentes investigaciones en fuentes abiertas (#OSINT). Hello! I share some #OSINT_TIPS for your excellent …☆26Jan 25, 2024Updated 2 years ago
- Checklists for Testing Security environment☆871Mar 12, 2025Updated 11 months ago
- This repository contains a curated list of resources I suggest on LinkedIn and Twitter.📝🌝☆656May 4, 2024Updated last year