☆227Jun 18, 2021Updated 4 years ago
Alternatives and similar repositories for NSA-Linux-Hardening-docs
Users that are interested in NSA-Linux-Hardening-docs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆921Aug 30, 2023Updated 2 years ago
- some AV / EDR / analysis studies☆10May 21, 2023Updated 2 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Google Dorking Payloads☆13Jun 24, 2024Updated last year
- Collection of various materials on operational security.☆25Nov 15, 2016Updated 9 years ago
- Some of my rough notes for Docker threat detection☆51Aug 26, 2023Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Dec 13, 2025Updated 4 months ago
- Apple BLE proximity pairing message spoofing☆19Aug 29, 2023Updated 2 years ago
- ☆49Jul 31, 2023Updated 2 years ago
- Rust Weaponization for Red Team Engagements.☆28Nov 8, 2022Updated 3 years ago
- A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for id…☆1,803Sep 11, 2025Updated 7 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- EduRansW (Vulnransomware) An safe-to-use vulnerable ransomware designed to learn about reversing and exploitation of basic ransomware vri…☆15May 22, 2025Updated 11 months ago
- Kernel Mode Driver for Elevating Process Privileges☆132Mar 23, 2023Updated 3 years ago
- ☆16Oct 18, 2024Updated last year
- Vulnerable Code Snippets☆46Apr 2, 2023Updated 3 years ago
- A bunch of scripts and code i wrote.☆150Nov 7, 2024Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Jul 27, 2023Updated 2 years ago
- Yet Another 403 Bypass Tool☆12Feb 19, 2023Updated 3 years ago
- Everything about Active Directory in a hybrid infrastructure!☆27Dec 31, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Linux anti-debugging and anti-analysis rust library☆337Dec 26, 2022Updated 3 years ago
- ☆86Jan 9, 2023Updated 3 years ago
- ☠️ Code for the Hackfest Workshop☆10Oct 12, 2024Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆56May 1, 2023Updated 3 years ago
- Private Nuclei Templates☆99Feb 24, 2025Updated last year
- ☆36Feb 2, 2015Updated 11 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated 2 years ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆991Nov 27, 2023Updated 2 years ago
- Manage attack surface data on Elasticsearch☆26Nov 20, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🔦 Uncovers a censored email's domain☆41Jun 15, 2023Updated 2 years ago
- /dev/tty☆29Mar 31, 2026Updated last month
- OSINT-compass is a powerful tool for collecting, organizing, and analyzing open-source information from various sources.☆18Apr 26, 2023Updated 3 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 3 months ago
- Slides and materials for the talk Reconstructing Rust Types: A Practical Guide for Reverse Engineers at RE//verse 2025, presented on Febr…☆25May 23, 2025Updated 11 months ago
- A collection of tools and detections for the Sliver C2 Frameworj☆134Apr 24, 2023Updated 3 years ago
- Best prompt usecase for Top App/Website Builder☆29Aug 30, 2025Updated 8 months ago