Linux Security and Hardening Security Guide
☆215Sep 17, 2023Updated 2 years ago
Alternatives and similar repositories for Linux-Security-and-Hardening-Security-Guide
Users that are interested in Linux-Security-and-Hardening-Security-Guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- Wireshark RDP resources☆221Jun 2, 2025Updated 10 months ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 3 years ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆322Aug 8, 2024Updated last year
- ☆138Apr 20, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆21Mar 20, 2026Updated last month
- ☆13Jan 19, 2023Updated 3 years ago
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆17Mar 13, 2024Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- Everything related to Linux Forensics☆719Jul 13, 2023Updated 2 years ago
- ☆60Jun 24, 2023Updated 2 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆59Mar 10, 2026Updated last month
- ☆1,075May 18, 2024Updated last year
- Internal Network Penetration Test Playbook☆20Jul 13, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Nuclei POC 模板☆10Feb 17, 2023Updated 3 years ago
- Search this list of OSINT Practitioners and learn about OSINT, it includes numerous, blogs and tutorials.☆103Oct 12, 2025Updated 6 months ago
- Retrieve AD accounts description and search for password in it☆81Jul 21, 2022Updated 3 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆783Jun 23, 2023Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- ☆159Nov 26, 2023Updated 2 years ago
- Scripts and piece of codes used for Active Directory configuration☆83Feb 14, 2023Updated 3 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆109Feb 21, 2023Updated 3 years ago
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆3,403Updated this week
- ☆10Feb 15, 2023Updated 3 years ago
- A collection of snippets of codes and commands to make your life easier!☆2,898Sep 25, 2023Updated 2 years ago
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆921Aug 30, 2023Updated 2 years ago
- This repository contains a curated list of resources I suggest on LinkedIn and Twitter.📝🌝☆657May 4, 2024Updated last year
- Tools & Interesting Things for RedTeam Ops☆2,271Feb 10, 2026Updated 2 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆44Jul 6, 2025Updated 9 months ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆418May 13, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Exploits targeting vBulletin.☆74Apr 15, 2023Updated 3 years ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆375Apr 6, 2024Updated 2 years ago
- Tools and Techniques for Red Team / Penetration Testing☆8,682Apr 18, 2026Updated last week
- ☆48Feb 11, 2023Updated 3 years ago
- Azure and AWS Attacks☆1,118Nov 25, 2022Updated 3 years ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Apr 3, 2024Updated 2 years ago