Linux Security and Hardening Security Guide
☆214Sep 17, 2023Updated 2 years ago
Alternatives and similar repositories for Linux-Security-and-Hardening-Security-Guide
Users that are interested in Linux-Security-and-Hardening-Security-Guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- Wireshark RDP resources☆221Jun 2, 2025Updated 10 months ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆321Aug 8, 2024Updated last year
- ☆137Apr 20, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆20Mar 20, 2026Updated 2 weeks ago
- ☆13Jan 19, 2023Updated 3 years ago
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆17Mar 13, 2024Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- Everything related to Linux Forensics☆718Jul 13, 2023Updated 2 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆58Mar 10, 2026Updated last month
- ☆60Jun 24, 2023Updated 2 years ago
- ☆1,076May 18, 2024Updated last year
- Internal Network Penetration Test Playbook☆20Jul 13, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Nuclei POC 模板☆10Feb 17, 2023Updated 3 years ago
- Search this list of OSINT Practitioners and learn about OSINT, it includes numerous, blogs and tutorials.☆103Oct 12, 2025Updated 5 months ago
- Retrieve AD accounts description and search for password in it☆81Jul 21, 2022Updated 3 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆782Jun 23, 2023Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- ☆159Nov 26, 2023Updated 2 years ago
- Scripts and piece of codes used for Active Directory configuration☆82Feb 14, 2023Updated 3 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆109Feb 21, 2023Updated 3 years ago
- An asynchronous OSINT tool for IP address intelligence that aggregates data from multiple APIs to provide accurate geolocation, network, …☆49Feb 6, 2026Updated 2 months ago
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆3,357Updated this week
- ☆10Feb 15, 2023Updated 3 years ago
- A collection of snippets of codes and commands to make your life easier!☆2,895Sep 25, 2023Updated 2 years ago
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆921Aug 30, 2023Updated 2 years ago
- This repository contains a curated list of resources I suggest on LinkedIn and Twitter.📝🌝☆656May 4, 2024Updated last year
- Tools & Interesting Things for RedTeam Ops☆2,265Feb 10, 2026Updated last month
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆44Jul 6, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆416May 13, 2025Updated 10 months ago
- Exploits targeting vBulletin.☆74Apr 15, 2023Updated 2 years ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆373Apr 6, 2024Updated 2 years ago
- Tools and Techniques for Red Team / Penetration Testing☆8,617Mar 18, 2025Updated last year
- ☆48Feb 11, 2023Updated 3 years ago
- Azure and AWS Attacks☆1,116Nov 25, 2022Updated 3 years ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated 2 years ago