Checklist of simple and not so simple things to enhance your OPSEC.
☆20Jul 24, 2018Updated 7 years ago
Alternatives and similar repositories for OPSEC-Checklist
Users that are interested in OPSEC-Checklist are comparing it to the libraries listed below
Sorting:
- Collection of various materials on operational security.☆23Nov 15, 2016Updated 9 years ago
- OPSEC related notes from various sources☆17Jun 22, 2015Updated 10 years ago
- I wrote a book about privacy and OPSEC, so here it is.☆66Aug 24, 2019Updated 6 years ago
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago
- ☆12Jun 12, 2021Updated 4 years ago
- Operational Security utility and automator.☆142Jul 21, 2020Updated 5 years ago
- Counter Surveillance and OPSEC research☆108Apr 2, 2025Updated 11 months ago
- Proxmark 3☆22Jun 8, 2019Updated 6 years ago
- A repo of utilities built over some period for forensics, anti-forensics, security and analytical purposes☆20Aug 23, 2024Updated last year
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆48Aug 1, 2020Updated 5 years ago
- ddos-checker is a tool used to perform a test on a website from a DDOS attack to find security gaps in a website.☆11Oct 16, 2025Updated 4 months ago
- Windows anti-forensics USB monitoring tool.☆69Feb 17, 2023Updated 3 years ago
- digital evidence board aka detective suite, aka CrazyWall☆72Jul 19, 2022Updated 3 years ago
- A collection of crackmes☆32Feb 15, 2018Updated 8 years ago
- ☆31May 2, 2020Updated 5 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- GRAnd: Extra blocks, IO, and tools for GNU Radio on Android☆10Aug 27, 2015Updated 10 years ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- Bus Pirate (cross-platform, cleaned up for OS X)☆45Sep 27, 2015Updated 10 years ago
- Talon Tools: The Framework for Practical IEEE 802.11ad Research☆42Aug 9, 2018Updated 7 years ago
- Http Security Headers Checker Tool written in PHP Cli + Useful Tips to set Http Security Headers☆10Mar 27, 2021Updated 4 years ago
- Baseline, check and correct your SQL Database Security☆12Mar 9, 2022Updated 3 years ago
- Sample code with security policies in Pulumi CrossGuard to implement preventive security checks in Infrastructure pipelines☆12Jan 4, 2023Updated 3 years ago
- Modular Monolith Backend Node Application☆13Jun 7, 2023Updated 2 years ago
- A simple GNU Radio message based burst FSK Transmitter and Receiver☆12May 31, 2015Updated 10 years ago
- Protect your sensitive HTML content with this AES encryption HTML loader. User will need to key in password in order to view the HTML con…☆11May 5, 2015Updated 10 years ago
- An hCaptcha solver API based on my package.☆10Apr 5, 2021Updated 4 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- github action to run the bandit security linter☆15Feb 26, 2026Updated last week
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Jan 16, 2026Updated last month
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆11Oct 16, 2021Updated 4 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Jul 1, 2017Updated 8 years ago
- Checking for leaked passwords through haveibeenpwned v2 API using the hash-range checker☆12Feb 7, 2024Updated 2 years ago