RaReNet / DFAK
The Digital First Aid Kit has moved to Gitlab:
☆109Updated 5 years ago
Alternatives and similar repositories for DFAK:
Users that are interested in DFAK are comparing it to the libraries listed below
- SAFETAG is a curricula, a methodology, and a framework for security auditors working with advocacy groups.☆79Updated 3 months ago
- Standalone VPN/Tor WiFi router for journalists and activists☆47Updated 8 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 7 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆14Updated last year
- A streamlined way to create STIX documents!☆32Updated 10 years ago
- It's like a polaroid, but for domains☆24Updated 9 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆45Updated 8 years ago
- Collection of IOCs related to targeting of civil society☆187Updated 3 years ago
- security in a box - tools and tactics for your digital security☆19Updated 9 years ago
- Baseline organizational policies and practices☆10Updated 7 years ago
- This is where we work on the newsletter☆28Updated 7 years ago
- Ops-Trust Platform - Portal☆21Updated 8 years ago
- Mass DNS resolution tool☆36Updated 4 years ago
- Simple script for PGP encrypted newsletter☆26Updated 8 years ago
- Enrich a host with open source security information☆27Updated 9 years ago
- ☆62Updated 10 years ago
- Browser extension that uses intelligence to combat malicious websites by blocking them in real-time.☆58Updated 4 years ago
- The web site☆15Updated last year
- DEPRECATED USE v3!☆59Updated 9 years ago
- Python static blog generator☆42Updated 8 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 10 years ago
- IRMA ansible☆24Updated 8 years ago
- Script to send kippo/cowrie login attempt information to https://isc.sans.edu/ssh.html☆17Updated 8 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 9 years ago
- A resource which illustrates how surveillance is being carried out around the world.☆18Updated 8 years ago
- Advices to look for malicious software on your devices☆17Updated 4 years ago