Neo23x0 / LOLSecIssuesLinks
Cybersecurity's lighter side: a collection of the most amusing misunderstandings and missteps from newcomers to offensive security tools. A repository where naiveté in infosec is met with humor.
☆57Updated last year
Alternatives and similar repositories for LOLSecIssues
Users that are interested in LOLSecIssues are comparing it to the libraries listed below
Sorting:
- All kinds of tiny shells☆58Updated 2 years ago
- Canary Detection☆168Updated 2 weeks ago
- ☆74Updated 2 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 10 months ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- ☆40Updated 9 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆195Updated 4 months ago
- ☆25Updated 2 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated last month
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 4 months ago
- Signature based honeypot detector tool written in Golang☆95Updated 2 months ago
- God Mode Detection Rules☆134Updated 9 months ago
- POSIX script for mail security checks of domain names☆75Updated last year
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆64Updated 2 months ago
- DFIR ORC PARSER PROJECT☆25Updated 3 months ago
- ☆44Updated 3 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆55Updated last week
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated last year
- Generate graphs and charts based on password cracking result☆161Updated 2 years ago
- Living Off Security Tools☆45Updated 7 months ago
- ☆71Updated 4 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆91Updated 7 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 10 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆75Updated 2 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆105Updated 7 months ago
- ☆99Updated last month
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year
- Finding ClickFix and FakeCAPTCHA like it's 1999☆38Updated this week