r0x000000000033 / Linux-Security-and-Hardening-Security-GuideView external linksLinks
Linux Security and Hardening Security Guide
☆214Sep 17, 2023Updated 2 years ago
Alternatives and similar repositories for Linux-Security-and-Hardening-Security-Guide
Users that are interested in Linux-Security-and-Hardening-Security-Guide are comparing it to the libraries listed below
Sorting:
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- Wireshark RDP resources☆221Jun 2, 2025Updated 8 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- Search this list of OSINT Practitioners and learn about OSINT, it includes numerous, blogs and tutorials.☆102Oct 12, 2025Updated 4 months ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆321Aug 8, 2024Updated last year
- ☆138Apr 20, 2023Updated 2 years ago
- Everything related to Linux Forensics☆719Jul 13, 2023Updated 2 years ago
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆17Jan 22, 2026Updated 3 weeks ago
- ☆11Aug 31, 2023Updated 2 years ago
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆18Mar 13, 2024Updated last year
- Retrieve AD accounts description and search for password in it☆82Jul 21, 2022Updated 3 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 2 years ago
- Scripts and piece of codes used for Active Directory configuration☆83Feb 14, 2023Updated 3 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Apr 3, 2024Updated last year
- Internal Network Penetration Test Playbook☆20Jul 13, 2021Updated 4 years ago
- ☆13Jan 19, 2023Updated 3 years ago
- ☆1,071May 18, 2024Updated last year
- AAD related enumeration in Nim☆132Sep 7, 2023Updated 2 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Sep 8, 2022Updated 3 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆783Jun 23, 2023Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- ☆109Feb 21, 2023Updated 2 years ago
- Tools & Interesting Things for RedTeam Ops☆2,250Feb 10, 2026Updated last week
- ☆81May 27, 2023Updated 2 years ago
- ☆47Feb 11, 2023Updated 3 years ago
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆3,166Feb 3, 2026Updated 2 weeks ago
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆914Aug 30, 2023Updated 2 years ago
- Hacking and Cyber Security Ebooks | For More Visit -☆86Oct 12, 2019Updated 6 years ago
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…