SecurityInnovation / Security-Best-Practices
A Security and Privacy Guide for non-technical users
☆42Updated 8 years ago
Related projects: ⓘ
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆44Updated 2 years ago
- Maltego integration of https://haveibeenpwned.com☆57Updated 7 months ago
- Building a community for those that both seek and wish to provide mentorship in Information Security.☆19Updated last year
- ☆51Updated 5 years ago
- Legal, procedural and policies document templates for operating an IRT☆63Updated 6 months ago
- VPS Network Cloud Web Applications☆24Updated 5 years ago
- Lootbox downloads open directories shared on Twitter.☆36Updated 3 years ago
- A list of collected articles and resources from the website Peerlyst☆17Updated 7 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆112Updated 5 years ago
- A few transforms and a machine for parsing Nmap XML results☆33Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- A collection of useful scripts for penetration testers☆81Updated 11 years ago
- Metasploit Framework☆26Updated 6 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- ☆34Updated this week
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆44Updated 7 years ago
- Maltego transforms for the ThreatCrowd search API☆45Updated 6 years ago
- My Presentations in PDF☆30Updated 8 years ago
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆63Updated 6 years ago
- Rekall is an endpoint security solution.☆39Updated 6 years ago
- Overview Tooling Process Physical People☆45Updated 3 years ago
- Common Findings Database☆100Updated 5 years ago
- So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them t…☆54Updated 6 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 8 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆64Updated 11 months ago
- Passive recon / OSINT automation script☆40Updated 5 years ago
- Maltego Transforms to Query Traffic Records☆33Updated 8 years ago
- DefectDojo Documentation☆15Updated 2 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 10 years ago
- ☆27Updated this week