A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the security of their devices.
☆144Feb 21, 2024Updated 2 years ago
Alternatives and similar repositories for Operational-Security-101
Users that are interested in Operational-Security-101 are comparing it to the libraries listed below
Sorting:
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆202Jul 3, 2024Updated last year
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Subdomains scanner Spider☆13Feb 29, 2024Updated 2 years ago
- Unauthorized Docker Exploitation Tool☆37Dec 24, 2023Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Mar 7, 2024Updated last year
- Hashes of infamous malware☆26Jul 10, 2023Updated 2 years ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆116Jul 15, 2023Updated 2 years ago
- Guía completa para configurar y utilizar servicios financieros NO-KYC. Este repositorio cubre herramientas de finanzas digitales anónimas…☆16Aug 7, 2024Updated last year
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- ☆33Dec 10, 2024Updated last year
- Web Penetration Testing Course Materials☆32May 13, 2024Updated last year
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆38Dec 7, 2025Updated 2 months ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆63Feb 22, 2026Updated last week
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 3 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Nov 11, 2025Updated 3 months ago
- Url scrapper or extractor from alienvault☆38Mar 1, 2025Updated last year
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Nov 16, 2023Updated 2 years ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- Top 400 passwords as per HaveIBeenPwned☆22Oct 14, 2024Updated last year
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- ☆568Mar 28, 2024Updated last year
- Collection of different Azure/Entra focused solutions (Deployable templates, Function Apps, etc)☆79Updated this week
- ☆20Sep 24, 2025Updated 5 months ago
- ☆24Nov 19, 2024Updated last year
- A curated list of Awesome Threat Intelligence Blogs☆506Feb 16, 2026Updated 2 weeks ago
- ☆168Feb 29, 2024Updated 2 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands.☆42Apr 25, 2024Updated last year
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆543Jun 3, 2025Updated 9 months ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆277Dec 20, 2025Updated 2 months ago
- Webshell agent in aspx and php☆27Dec 11, 2025Updated 2 months ago
- ☆27Aug 8, 2021Updated 4 years ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆772Feb 8, 2026Updated 3 weeks ago
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆486Apr 17, 2025Updated 10 months ago
- SSH & FTP brute-forcing tool written in python☆11Oct 2, 2024Updated last year