The Life Operational Security (OpSec) Guide provides invaluable insights and actionable recommendations for individuals seeking to enhance their privacy, anonymity, and security in their personal and professional lives. By implementing robust measures to mitigate the risk of tracking and mass surveillance, individuals can safeguard their sensiti…
☆379Feb 3, 2026Updated last month
Alternatives and similar repositories for OpSec-Guide
Users that are interested in OpSec-Guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All the info you need.☆21Updated this week
- Checklist of simple and not so simple things to enhance your OPSEC.☆20Jul 24, 2018Updated 7 years ago
- This informative guide offers essential tips to avoid legal trouble with law enforcement by educating readers on their rights and ways to…☆33Nov 14, 2025Updated 4 months ago
- Counter Surveillance and OPSEC research☆109Apr 2, 2025Updated 11 months ago
- Awesome Operational Security resources☆47Dec 2, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- #1 Fully featured automated batchfile MAC address spoofer!☆90Dec 12, 2025Updated 3 months ago
- A resource for users intent on optimizing their usage of this highly secure and privacy focused mobile operating system.☆202Jan 5, 2026Updated 2 months ago
- Ansible role to build an Onion Pi Tor proxy with a Raspberry Pi 4 Model 4 B☆11Dec 12, 2021Updated 4 years ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆44Feb 6, 2026Updated last month
- ☆20Sep 6, 2025Updated 6 months ago
- Opensource Telegram (Osint) Tool☆20Jan 3, 2025Updated last year
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 9 months ago
- Resk is a robust Python library designed to enhance security and manage context when interacting with LLMs. It provides a protective …☆16Dec 19, 2025Updated 3 months ago
- ☆11Jun 20, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆48Aug 1, 2020Updated 5 years ago
- Collection of various materials on operational security.☆24Nov 15, 2016Updated 9 years ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- ☆26Apr 24, 2025Updated 11 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated last month
- Antiforensic actions to secure your device if it's physically stolen from you☆14Jan 22, 2023Updated 3 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Jun 10, 2025Updated 9 months ago
- iOS WarDragon Utility App☆129Mar 17, 2026Updated last week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Jan 10, 2026Updated 2 months ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 3 years ago
- Want to know more about Privacy & Security, you will find mnay helpful Subject Matter Experts as-well-as the resources they use.☆19Apr 20, 2025Updated 11 months ago
- A little tool to play with Windows security☆12Jan 21, 2026Updated 2 months ago
- Collection of links on bad opsec☆478May 31, 2024Updated last year
- A repo of utilities built over some period for forensics, anti-forensics, security and analytical purposes☆20Aug 23, 2024Updated last year
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 5 months ago
- QubesOS wiki and simple setup scripts for use by journalists and media organizations.☆20Oct 3, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Application security made easy☆14Mar 20, 2022Updated 4 years ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆62Nov 26, 2025Updated 4 months ago
- How to securely create and operate a pseudonymous identity.☆98Oct 6, 2022Updated 3 years ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- EvilDroid automates the exploitation of CVE-2024-0044, installing malicious payloads on a target device and extracting sensitive data. It…☆26Sep 6, 2025Updated 6 months ago
- ldid and ldid2☆14Jun 25, 2018Updated 7 years ago
- A comprehensive penetration testing operations dashboard for managing projects, tasks, findings, clients, and assets. Built with Next.js,…☆304Dec 16, 2025Updated 3 months ago