RichardLitt / awesome-opsecLinks
Awesome Operational Security resources
☆42Updated 8 years ago
Alternatives and similar repositories for awesome-opsec
Users that are interested in awesome-opsec are comparing it to the libraries listed below
Sorting:
- Collection of various materials on operational security.☆17Updated 8 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆27Updated 7 years ago
- Hashes of infamous malware☆26Updated last year
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- Tools for OSINT in Emirates☆22Updated 2 months ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- A collection of cyberchef recipes for use in osint investigations☆13Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Sniffing out well-known threat groups☆28Updated 10 months ago
- random scripts and utilities used for pentesting or R&D purposes☆9Updated last year
- Collection of videos of Raids on Cybercriminals☆19Updated 3 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated 2 years ago
- Find open storage buckets and accessible files across Amazon Web Services, Google Cloud, Microsoft Azure, and Digital Ocean simultaneousl…☆16Updated 5 months ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 2 years ago
- Fetch information about a public Google document.☆13Updated last year
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- Checklist of simple and not so simple things to enhance your OPSEC.☆19Updated 6 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- Grap information for multiple IP Addresses including lat/long, city, state, and if the IP is owned by a VPN.☆27Updated 3 years ago
- A library that scrapes Linkedin for user data☆23Updated 4 years ago
- Admin for☆17Updated 7 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Ransomware groups posts☆39Updated this week
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- List of sources for cybersecurity news☆36Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- ☆28Updated last year
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- This repository contains a mindmap for different techniques for using Censys Search☆13Updated last year