☆227Jun 18, 2021Updated 4 years ago
Alternatives and similar repositories for NSA-Linux-Hardening-docs
Users that are interested in NSA-Linux-Hardening-docs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆55Oct 12, 2024Updated last year
- Handy scripts and one-liners to make life easier☆37Mar 6, 2023Updated 3 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 3 years ago
- Collection of various materials on operational security.☆25Nov 15, 2016Updated 9 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Dec 13, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- Apple BLE proximity pairing message spoofing☆19Aug 29, 2023Updated 2 years ago
- ☆49Jul 31, 2023Updated 2 years ago
- EduRansW (Vulnransomware) An safe-to-use vulnerable ransomware designed to learn about reversing and exploitation of basic ransomware vri…☆15May 22, 2025Updated 10 months ago
- Kernel Mode Driver for Elevating Process Privileges☆132Mar 23, 2023Updated 3 years ago
- Techlore video channel content & more.☆205Jan 6, 2024Updated 2 years ago
- ☆16Oct 18, 2024Updated last year
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Jul 27, 2023Updated 2 years ago
- Yet Another 403 Bypass Tool☆12Feb 19, 2023Updated 3 years ago
- Everything about Active Directory in a hybrid infrastructure!☆27Dec 31, 2022Updated 3 years ago
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆44Oct 29, 2025Updated 5 months ago
- ☆18Mar 26, 2024Updated 2 years ago
- Recon 2023 slides and code☆79Jun 9, 2023Updated 2 years ago
- ☆86Jan 9, 2023Updated 3 years ago
- Firmware for HamLoraChat only T-Beam v1.1☆10Aug 6, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆56May 1, 2023Updated 2 years ago
- ☆36Feb 2, 2015Updated 11 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated 2 years ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆985Nov 27, 2023Updated 2 years ago
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago
- A Python package and command line utility for scanning emails with YARA rules☆21Apr 5, 2026Updated 2 weeks ago
- /dev/tty☆29Mar 31, 2026Updated 2 weeks ago
- OSINT-compass is a powerful tool for collecting, organizing, and analyzing open-source information from various sources.☆18Apr 26, 2023Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Collection of knowledge about information security☆677Mar 8, 2026Updated last month
- A collection of tools and detections for the Sliver C2 Frameworj☆134Apr 24, 2023Updated 2 years ago
- Best prompt usecase for Top App/Website Builder☆29Aug 30, 2025Updated 7 months ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated 2 years ago
- The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful u…☆36Feb 16, 2026Updated 2 months ago
- Checklists☆16Sep 22, 2016Updated 9 years ago
- Convert kivy python code into android apk☆14Jan 15, 2025Updated last year