ETeissonniere / OPSEC-Checklist
Checklist of simple and not so simple things to enhance your OPSEC.
☆19Updated 6 years ago
Alternatives and similar repositories for OPSEC-Checklist:
Users that are interested in OPSEC-Checklist are comparing it to the libraries listed below
- Collection of various materials on operational security.☆15Updated 8 years ago
- Awesome Operational Security resources☆43Updated 8 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Python API wrapper for DarkSearch (darksearch.io).☆33Updated 3 years ago
- WebHook for Red Team☆26Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- An organized collection of default passwords for various devices and services.☆38Updated 2 years ago
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆11Updated 2 years ago
- web application pentesting tools for docker☆17Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆61Updated 3 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆36Updated 2 years ago
- Curated list of ransomware-related resources; awesome style.☆16Updated 2 months ago
- ☆14Updated 4 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Good info about DeepWeb and OSINT☆32Updated 3 weeks ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Show the marketplace profile from FB☆14Updated 2 years ago
- ☆20Updated 5 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 10 months ago
- A wacky exploitation framework written in pure python3.☆24Updated last year
- OPSEC related notes from various sources☆17Updated 9 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆27Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 3 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Updated 2 months ago
- AIL framework - Analysis Information Leak framework☆8Updated 7 years ago
- A very powerful tool for All kind of MITM attacks☆14Updated last year
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 8 months ago