RichardLitt / awesome-opsec
Awesome Operational Security resources
☆37Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-opsec
- Collection of various materials on operational security.☆12Updated 8 years ago
- Hashes of infamous malware☆26Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 4 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆13Updated 2 years ago
- New Framework Red Team Operations☆17Updated 3 years ago
- Files for my Python3 Create Your Own Tool Series☆23Updated 2 years ago
- A learning and testing environment for web application hacking and pentesting.☆24Updated 3 years ago
- ☆15Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆13Updated 7 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆18Updated 7 months ago
- Melee: Tool to Detect Infections in MySQL Instances☆21Updated last year
- Notes and Commands for CTFs☆16Updated 4 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆28Updated last year
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆26Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- EGO is a vulnerability scanner developed by chickenpwny at PolitoInc. It was created to provide a platform for hackers to store multiple …☆28Updated 4 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆19Updated 9 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 weeks ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated last year
- Image Payload Creating/Injecting tools☆12Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- random scripts and utilities used for pentesting or R&D purposes☆9Updated 7 months ago
- Wireless Pentesting Device☆20Updated 4 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆12Updated 2 years ago
- A collection of cyberchef recipes for use in osint investigations☆13Updated 2 years ago
- ☆18Updated last month
- WordPress version identification and vulnerability finder.☆28Updated 2 years ago