Iptables Essentials: Common Firewall Rules and Commands.
☆1,582Nov 19, 2024Updated last year
Alternatives and similar repositories for iptables-essentials
Users that are interested in iptables-essentials are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆1,626Nov 19, 2024Updated last year
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,829Nov 19, 2024Updated last year
- Open source tool to help you build a valid SSL certificate chain.☆378Nov 19, 2024Updated last year
- My simple Swiss Army knife for http/https troubleshooting and profiling.☆3,852Nov 19, 2024Updated last year
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆509Nov 19, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆10,487Nov 19, 2024Updated last year
- Wipe, reinstall or restore your system from running GNU/Linux distribution. Via SSH, without rebooting.☆282Nov 19, 2024Updated last year
- Collection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.☆540Dec 1, 2019Updated 6 years ago
- OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).☆157Nov 15, 2019Updated 6 years ago
- How to improve NGINX performance, security, and other important things.☆14,139Nov 19, 2024Updated last year
- A collection of Linux Sysadmin Test Questions and Answers. Test your knowledge and skills in different fields with these Q/A.☆11,551Nov 19, 2024Updated last year
- Bash post exploitation toolkit☆747Apr 1, 2026Updated 2 weeks ago
- Active Directory Assessment and Privilege Escalation Script☆1,129Dec 7, 2022Updated 3 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆446Oct 26, 2022Updated 3 years ago
- Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥☆7,430Mar 26, 2026Updated 2 weeks ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,153Oct 19, 2025Updated 5 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,468Oct 1, 2025Updated 6 months ago
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sys…☆15,502Jan 28, 2026Updated 2 months ago
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,907Jan 24, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Create multiple TOR instances with a load-balancing.☆1,150Nov 19, 2024Updated last year
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,451Nov 20, 2025Updated 4 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting