☆224Jun 18, 2021Updated 4 years ago
Alternatives and similar repositories for NSA-Linux-Hardening-docs
Users that are interested in NSA-Linux-Hardening-docs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- ☆55Oct 12, 2024Updated last year
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆920Aug 30, 2023Updated 2 years ago
- some AV / EDR / analysis studies☆10May 21, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Handy scripts and one-liners to make life easier☆36Mar 6, 2023Updated 3 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- Collection of various materials on operational security.☆24Nov 15, 2016Updated 9 years ago
- A journal for $6,000 Riot Vanguard bounty.☆69Sep 22, 2023Updated 2 years ago
- Some of my rough notes for Docker threat detection☆50Aug 26, 2023Updated 2 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- EduRansW (Vulnransomware) An safe-to-use vulnerable ransomware designed to learn about reversing and exploitation of basic ransomware vri…☆14May 22, 2025Updated 10 months ago
- Apple BLE proximity pairing message spoofing☆19Aug 29, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- AntiHunter Perimeter Defense Systems☆108Updated this week
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- Rust Weaponization for Red Team Engagements.☆28Nov 8, 2022Updated 3 years ago
- A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for id…☆1,789Sep 11, 2025Updated 6 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- Kernel Mode Driver for Elevating Process Privileges☆132Mar 23, 2023Updated 3 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- ☆16Oct 18, 2024Updated last year
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Linux Security and Monitoring Scripts☆329Sep 27, 2025Updated 6 months ago
- A bunch of scripts and code i wrote.☆149Nov 7, 2024Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Jul 27, 2023Updated 2 years ago
- Everything about Active Directory in a hybrid infrastructure!☆26Dec 31, 2022Updated 3 years ago
- Linux anti-debugging and anti-analysis rust library☆338Dec 26, 2022Updated 3 years ago
- ☆18Mar 26, 2024Updated 2 years ago
- ☆86Jan 9, 2023Updated 3 years ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆102Dec 20, 2024Updated last year
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,799Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆57May 1, 2023Updated 2 years ago
- Private Nuclei Templates☆99Feb 24, 2025Updated last year
- Inject different payloads in the log of your target☆18Apr 3, 2022Updated 3 years ago
- ☆36Feb 2, 2015Updated 11 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆984Nov 27, 2023Updated 2 years ago
- Force target victim to unsafe network☆31Jun 6, 2025Updated 9 months ago