The Life Operational Security (OpSec) Guide provides invaluable insights and actionable recommendations for individuals seeking to enhance their privacy, anonymity, and security in their personal and professional lives. By implementing robust measures to mitigate the risk of tracking and mass surveillance, individuals can safeguard their sensiti…
☆438Apr 17, 2026Updated 3 weeks ago
Alternatives and similar repositories for OpSec-Guide
Users that are interested in OpSec-Guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All the info you need.☆21Mar 23, 2026Updated last month
- Checklist of simple and not so simple things to enhance your OPSEC.☆20Jul 24, 2018Updated 7 years ago
- This is a collection of useful websites and tools/software for programming.☆18May 25, 2025Updated 11 months ago
- Awesome Operational Security resources☆46Dec 2, 2016Updated 9 years ago
- #1 Fully featured automated batchfile MAC address spoofer!☆90Dec 12, 2025Updated 4 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A resource for users intent on optimizing their usage of this highly secure and privacy focused mobile operating system.☆212Jan 5, 2026Updated 4 months ago
- A Beacon Object File suite for Microsoft SQL Server that speaks TDS 7.4 on the wire itself☆94Apr 9, 2026Updated last month
- Another Windows tweaking guide for better performance, privacy, & security!☆39Sep 9, 2024Updated last year
- The comprehensive guide for online anonymity and OpSec.☆719Apr 25, 2026Updated 2 weeks ago
- Ansible role to build an Onion Pi Tor proxy with a Raspberry Pi 4 Model 4 B☆11Dec 12, 2021Updated 4 years ago
- Set of PoC to abuse Windows minifilters functionality☆76May 1, 2026Updated last week
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆46Feb 6, 2026Updated 3 months ago
- This is a PAM Skeleton Key that can be used for persistence, lateral movement, and privilege escalation.☆43Apr 23, 2026Updated 2 weeks ago
- Opensource Telegram (Osint) Tool☆23Jan 3, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 10 months ago
- Collection of links on bad opsec☆480May 31, 2024Updated last year
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆51Aug 1, 2020Updated 5 years ago
- Collection of various materials on operational security.☆25Nov 15, 2016Updated 9 years ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 6 months ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆286Oct 8, 2025Updated 7 months ago
- Information about Progress MoveIT CVE☆11Jun 16, 2023Updated 2 years ago
- ☆59Dec 10, 2025Updated 4 months ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆57Jun 11, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Antiforensic actions to secure your device if it's physically stolen from you☆14Jan 22, 2023Updated 3 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆42Jun 10, 2025Updated 10 months ago
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 3 years ago
- Want to know more about Privacy & Security, you will find mnay helpful Subject Matter Experts as-well-as the resources they use.☆20Apr 20, 2025Updated last year
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 2 months ago
- A little tool to play with Windows security☆12Jan 21, 2026Updated 3 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆103Jan 10, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 6 months ago
- Minimalistic HTTP(S) client for the NT kernel☆61Dec 1, 2025Updated 5 months ago
- Collection of red team techniques.☆70Apr 25, 2025Updated last year
- QubesOS wiki and simple setup scripts for use by journalists and media organizations.☆21Oct 3, 2024Updated last year
- Application security made easy☆14Mar 20, 2022Updated 4 years ago
- ↕️🤫 Stealth redirector for your red team operation security☆1,076Mar 1, 2026Updated 2 months ago
- ☆47Apr 21, 2026Updated 2 weeks ago