The Life Operational Security (OpSec) Guide provides invaluable insights and actionable recommendations for individuals seeking to enhance their privacy, anonymity, and security in their personal and professional lives. By implementing robust measures to mitigate the risk of tracking and mass surveillance, individuals can safeguard their sensiti…
☆383Apr 1, 2026Updated 2 weeks ago
Alternatives and similar repositories for OpSec-Guide
Users that are interested in OpSec-Guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All the info you need.☆21Mar 23, 2026Updated 3 weeks ago
- This informative guide offers essential tips to avoid legal trouble with law enforcement by educating readers on their rights and ways to…☆34Nov 14, 2025Updated 5 months ago
- Awesome Operational Security resources☆46Dec 2, 2016Updated 9 years ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆325Mar 24, 2026Updated 3 weeks ago
- Ansible role to build an Onion Pi Tor proxy with a Raspberry Pi 4 Model 4 B☆11Dec 12, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆44Feb 6, 2026Updated 2 months ago
- ☆20Sep 6, 2025Updated 7 months ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 10 months ago
- Resk is a robust Python library designed to enhance security and manage context when interacting with LLMs. It provides a protective …☆16Apr 10, 2026Updated last week
- Collection of links on bad opsec☆481May 31, 2024Updated last year
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆49Aug 1, 2020Updated 5 years ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆286Oct 8, 2025Updated 6 months ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 5 months ago
- ☆59Dec 10, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆57Jun 11, 2025Updated 10 months ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- ☆26Apr 24, 2025Updated 11 months ago
- Antiforensic actions to secure your device if it's physically stolen from you☆14Jan 22, 2023Updated 3 years ago
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 2 months ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 3 years ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆99Jan 10, 2026Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A little tool to play with Windows security☆12Jan 21, 2026Updated 2 months ago
- A repo of utilities built over some period for forensics, anti-forensics, security and analytical purposes☆20Aug 23, 2024Updated last year
- Minimalistic HTTP(S) client for the NT kernel☆61Dec 1, 2025Updated 4 months ago
- Collection of red team techniques.☆70Apr 25, 2025Updated 11 months ago
- QubesOS wiki and simple setup scripts for use by journalists and media organizations.☆20Oct 3, 2024Updated last year
- Application security made easy☆14Mar 20, 2022Updated 4 years ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆62Nov 26, 2025Updated 4 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆1,069Mar 1, 2026Updated last month
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ldid and ldid2☆14Jun 25, 2018Updated 7 years ago
- Comprehensive Counter OSINT and privacy guide (initially for CIS countries)☆351May 23, 2024Updated last year
- NTLM HTTP relay tool with SOCKS proxy for browser session hijacking☆132Apr 6, 2026Updated last week
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- Browser Chrome extensions, to help with OSINT, OPSEC, Privacy & Obfuscation.☆409Nov 9, 2025Updated 5 months ago
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆45Aug 2, 2025Updated 8 months ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆22Aug 20, 2024Updated last year