A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the security of their devices.
☆145Feb 21, 2024Updated 2 years ago
Alternatives and similar repositories for Operational-Security-101
Users that are interested in Operational-Security-101 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆205Jul 3, 2024Updated last year
- Hashes of infamous malware☆26Jul 10, 2023Updated 2 years ago
- Repository of open source malware here on Github!☆44Jan 11, 2022Updated 4 years ago
- The Threat Actor Profile Guide for CTI Analysts☆120Jul 15, 2023Updated 2 years ago
- ☆161Apr 6, 2026Updated 3 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆794Feb 8, 2026Updated 2 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆53Mar 7, 2024Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆100Feb 2, 2024Updated 2 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆37Dec 7, 2025Updated 4 months ago
- Practice CTI Quiz☆13Mar 20, 2024Updated 2 years ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆26Dec 1, 2022Updated 3 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Mar 14, 2026Updated last month
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆21Apr 16, 2026Updated 2 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆32Oct 7, 2024Updated last year
- Sleep obfuscation☆274Dec 13, 2024Updated last year
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated 2 years ago
- ☆33Dec 10, 2024Updated last year
- ☆570Mar 28, 2024Updated 2 years ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated last year
- Collection of different Azure/Entra focused solutions (Deployable templates, Function Apps, etc)☆81Apr 12, 2026Updated 3 weeks ago
- Repository with Hunting and Detection Queries for Microsoft Sentinel and Microsoft Defender XDR☆17Nov 7, 2025Updated 5 months ago
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆45Aug 2, 2025Updated 9 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Feb 7, 2023Updated 3 years ago
- Subdomains scanner Spider☆13Feb 29, 2024Updated 2 years ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆67Feb 22, 2026Updated 2 months ago
- Conditional Access Reporting☆29Apr 4, 2025Updated last year
- ☆24Mar 25, 2025Updated last year
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆281Dec 20, 2025Updated 4 months ago
- Simulate Windows EXE for Malware Research!☆20Sep 4, 2024Updated last year
- This is for my crappy (but hopefully useful) MDE and Sentinel KQL queries! #KQLThePlanet☆13Jan 24, 2026Updated 3 months ago
- Unauthorized Docker Exploitation Tool☆37Dec 24, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Web Penetration Testing Course Materials☆31May 13, 2024Updated last year
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆39Oct 30, 2024Updated last year
- ☆28Sep 9, 2024Updated last year
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆143Jan 2, 2025Updated last year
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆326Oct 12, 2025Updated 6 months ago
- A list of resources to build a information security team.☆16Feb 10, 2021Updated 5 years ago