rsherstnev / LinuxConfigsLinks
My linux config files
☆10Updated last week
Alternatives and similar repositories for LinuxConfigs
Users that are interested in LinuxConfigs are comparing it to the libraries listed below
Sorting:
- Simple Authenticated Vulnerability Scanner for Linux hosts and Docker images☆44Updated 2 years ago
- Adding PowerShell scripts that I use on my Proxmox server to automate certain tasks.☆11Updated 2 years ago
- Cisco IOS Security Inspector☆37Updated 3 weeks ago
- A self hosted yopmail like server running in a docker☆65Updated last year
- Tools for passing OSCP☆24Updated this week
- A collection of nftables, multi routing scripts, port knocked, and iptables files. To get inspiration to make your own firewalls.☆90Updated 4 years ago
- A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell☆14Updated 4 years ago
- Another Hardening Windows Tool☆51Updated last year
- Cisco Type 7 Password Decrypter☆124Updated 2 years ago
- Aliases and functions for the lazy penetration tester☆69Updated last year
- CLI & library to search for default credentials among thousands of Products / Vendors☆54Updated 9 months ago
- Python script that runs Masscan against an IP to collect open ports, feed those ports to Nmap, which finds service versions and runs defa…☆23Updated 4 years ago
- NTP Exfiltration Tool☆146Updated last year
- Pwning IPv6 Networks☆36Updated 3 weeks ago
- Friendly graphical output of the nmap tool that allows filtering by open ports☆187Updated 3 years ago
- Penetration Testing with Kali Linux☆22Updated 6 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 6 months ago
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- A collection of my adventures through hackthebox.eu☆36Updated 4 years ago
- Various wordlists for bruteforce☆35Updated 4 years ago
- Docker image to exploit RCE, try for pentest methods and test container security solutions (trivy, falco and etc.)☆94Updated 4 years ago
- A simple, POSIX shell script to check sysctl values against a predefined reference file.☆20Updated 10 months ago
- Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.☆85Updated 3 months ago
- Faraday's Command Line Interface☆51Updated 2 months ago
- Excel parser for various pentesting tools.☆31Updated 2 years ago
- Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack and/or Telegram.☆257Updated 5 months ago
- Check IP addresses against known cloud provider IP address ranges☆46Updated 2 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- Interactive navi redteam cheats☆32Updated 3 months ago