RedWolfIntelligence / Open-Source-Security-List-
This list of tools is meant to act as a staple resource for Small to Medium businesses. We understand the hardship of not being able to afford adequate security. We are firm believers that everyone deserves to be secure at a cost effective rate.
☆49Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Open-Source-Security-List-
- Repository of resources for configuring a Red Team SIEM using Elastic☆98Updated 6 years ago
- Just a collection of pentest stuffs☆96Updated 4 years ago
- A bunch of scripts I use to work with urlscan.io☆33Updated 5 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 3 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆54Updated 5 years ago
- NebulousAD automated credential auditing tool.☆154Updated 4 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆47Updated 7 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 6 years ago
- ☆82Updated 5 years ago
- Automatically exported from code.google.com/p/nipper-ng☆66Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆27Updated 6 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆141Updated last year
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Principles of MITRE ATT&CK in the fraud domain☆34Updated 5 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆96Updated 4 years ago
- Collection of OSCP study material && tools.☆78Updated 5 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆124Updated 6 years ago
- Presentation Slides and Video links☆31Updated 3 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆125Updated 6 years ago
- Simulating Adversary Operations☆93Updated 6 years ago
- Scout - a Contactless Active Reconnaissance Tool☆51Updated last year
- Learn you a book for some infosec good☆62Updated 4 years ago
- Linux Local Privesc Helper and Agent☆165Updated 4 years ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆31Updated 7 years ago