Lists (2)
Sort Name ascending (A-Z)
Stars
Perform network trace of a single process by using network namespaces.
A curated list of engineering blogs
OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/
Collection of Auditd Examples and Presentations
A Linux Auditd rule set mapped to MITRE's Attack Framework
As hackers, we put a premium on function over elegance as time is always scarce. When you need to quickly create a solution to a problem, style concerns come secondary.
A collection of snippets of codes and commands to make your life easier!
Official electron build of draw.io
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, si…
The official code repository supporting the book, Grokking Artificial Intelligence Algorithms
Web interface for managing Haproxy, Nginx, Apache and Keepalived servers