The Digital First Aid Kit has moved to Gitlab:
☆110Jul 19, 2019Updated 6 years ago
Alternatives and similar repositories for DFAK
Users that are interested in DFAK are comparing it to the libraries listed below
Sorting:
- ☆15Jan 31, 2018Updated 8 years ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- security in a box - tools and tactics for your digital security☆20May 4, 2015Updated 10 years ago
- RAWRR is a multiplatform app that assists with note taking and report generation for security evaluations.☆18Feb 8, 2023Updated 3 years ago
- SAFETAG is a curricula, a methodology, and a framework for security auditors working with advocacy groups.☆82Feb 11, 2026Updated 2 weeks ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 2 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- Advices to look for malicious software on your devices☆18May 6, 2020Updated 5 years ago
- LevelUp project website☆32Aug 10, 2024Updated last year
- Use security tools from within IRC.☆24Mar 20, 2012Updated 13 years ago
- A set of Bash scripts that allows you to repeatably collect and compare baseline audit data from Linux and Windows systems☆20Oct 19, 2013Updated 12 years ago
- A resource which illustrates how surveillance is being carried out around the world.☆20Mar 29, 2016Updated 9 years ago
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 2 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Jan 10, 2017Updated 9 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Clone of git://git.code.sf.net/p/portecle/code☆12Feb 9, 2016Updated 10 years ago
- ☆11Mar 21, 2020Updated 5 years ago
- OSCP material tools and helpful scripts.☆11Mar 14, 2025Updated 11 months ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- ☆70Apr 28, 2020Updated 5 years ago
- Collection of IOCs related to targeting of civil society☆189Nov 11, 2021Updated 4 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 7 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- ☆63May 22, 2014Updated 11 years ago
- Ansible recipes for deployment of secure communications systems☆44Jan 21, 2018Updated 8 years ago
- ☆26Jun 20, 2018Updated 7 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago