takieyda / linux_customizations
A compilation of customizations for Debian-based Linux distrubutions (mostly Pop!_OS and Kali Linux) and (finally) a mostly automated script to put everything in place.
☆17Updated 10 months ago
Related projects: ⓘ
- Reconnaissance and Enumeration automation script☆51Updated 3 years ago
- ☆31Updated 11 months ago
- Small easy to find cheat sheet for Active directory exploitation☆44Updated 4 years ago
- ☆44Updated 2 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆79Updated 2 years ago
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆40Updated 3 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆72Updated 3 years ago
- A dump of all the scripts that I make☆19Updated 3 years ago
- This Script installs useful tools and stuff for pen-testing purpose.☆35Updated 3 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆72Updated 4 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆92Updated last year
- ☆20Updated this week
- Shell Please 1.0 : Reverse shell code generator.☆35Updated 2 years ago
- ☆37Updated this week
- Sharing my cheat-sheet of commands that I collected during prep for OSCP!☆39Updated 3 years ago
- ☆36Updated this week
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆42Updated 4 years ago
- A GUI for MSF Venom that serves the generated payload for you, in addition to launching a listener using the provided port.☆23Updated 4 years ago
- Post exploitation helper☆37Updated last year
- Useful scripts for pen testing. Require modification to run☆12Updated 3 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆136Updated 3 years ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Updated 3 years ago
- OSCP Notes written from PWK Course☆45Updated 3 years ago
- ☆36Updated 2 years ago
- Don't expect much :) Just expect to learn new things!☆61Updated 3 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆27Updated 3 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Updated 5 years ago
- Buffer Overflows☆29Updated 3 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆45Updated 4 years ago