takieyda / linux_customizationsLinks
A compilation of customizations for Debian-based Linux distrubutions (mostly Pop!_OS and Kali Linux) and (finally) a mostly automated script to put everything in place.
☆18Updated 11 months ago
Alternatives and similar repositories for linux_customizations
Users that are interested in linux_customizations are comparing it to the libraries listed below
Sorting:
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 4 years ago
- A script that I made to get the essentials I use for various reasons on Kali Linux.☆56Updated 2 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆83Updated 4 years ago
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆41Updated 4 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Updated 5 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- Just a repo of random Python scripts to get pentesters started with the Python language on engagements.☆216Updated 5 years ago
- Windows Penetration Testing Toolkit☆15Updated 3 years ago
- ☆48Updated 3 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 6 months ago
- Functions that can be used to gain Reverse Shells with PowerShell☆82Updated 2 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆76Updated 5 years ago
- Penetration Testing/Security Cheatsheets☆61Updated 9 years ago
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆99Updated 4 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆54Updated 4 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆42Updated 5 years ago
- Useful Commands, Reverse Shell, Privilege Escalation Methods, Impersonation Attacks, Useful Powershell Commands and more☆120Updated 5 years ago
- Generate common Reverse Shells for Pentesting☆42Updated 4 years ago
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆62Updated 4 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 6 years ago
- This Script installs useful tools and stuff for pen-testing purpose.☆38Updated 4 years ago
- Python template to assist with buffer overflows☆72Updated 5 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆63Updated 5 years ago
- A WLAN red team framework.☆157Updated 10 months ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- OSCP Notes written from PWK Course☆51Updated 4 years ago
- ☆32Updated last year
- A collection of personal scripts used in hacking excercises.☆153Updated 4 years ago