OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations
☆21Jul 4, 2017Updated 8 years ago
Alternatives and similar repositories for OpSec-In-OSINT
Users that are interested in OpSec-In-OSINT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of various materials on operational security.☆24Nov 15, 2016Updated 9 years ago
- Checklist of simple and not so simple things to enhance your OPSEC.☆20Jul 24, 2018Updated 7 years ago
- Technical Notes☆16Dec 1, 2017Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Dec 12, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Python bindings for Avast antivirus server version for Linux☆15Apr 26, 2014Updated 11 years ago
- ☆14Mar 31, 2018Updated 8 years ago
- eqgrp-auction decrypted☆13Apr 15, 2017Updated 8 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- A python script file to decrypt encrypted IEE (802.11) Radio .pcap files captured via Wireshark for extraction and analyse.☆10Sep 8, 2019Updated 6 years ago
- A powerful hardware ID spoofing tool designed to modify system identifiers for privacy and security purposes. Change MAC addresses, HWID,…☆42Mar 9, 2026Updated last month
- SOAP is a free, online tool aimed at enabling civil society organisations and activist groups to build security policies that work for th…☆16Mar 23, 2024Updated 2 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- ☆13Jun 13, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- On-demand and reusable contact forms that only send GnuPG-encrypted messages to your inbox.☆13Jul 4, 2018Updated 7 years ago
- Awesome Operational Security resources☆47Dec 2, 2016Updated 9 years ago
- Paste is a project that started from the files pastebin.com used before it was bought.☆22Feb 6, 2026Updated 2 months ago
- Tool to predict attacker groups from the techniques and software used☆49Aug 4, 2021Updated 4 years ago
- fun rootkits stuff!☆20Jul 28, 2015Updated 10 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Remote Sniffer: Tool for sending sniffered PCAP traffic in realtime into Winows/PC box with GUI Wireshark☆14Jul 9, 2020Updated 5 years ago
- ☆32Jan 14, 2026Updated 2 months ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆44Aug 25, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Scapy tools and scripts☆20Jun 19, 2020Updated 5 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- the main target of that project is to build a powerful and highly flexible android universal boot loader. with "universal" i mean that it…☆34Nov 4, 2013Updated 12 years ago
- Using Ansible as an orchestrator, this project is another solution for testers looking to configure and deploy a new VM or VPS box with t…☆21Dec 3, 2017Updated 8 years ago
- ☆16Oct 12, 2017Updated 8 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆24Jun 22, 2018Updated 7 years ago
- An Android app for the paranoids capable of remote SMS based device locking/wiping, faking the GPS and disabling the device cameras.☆11Dec 25, 2020Updated 5 years ago
- 🐧 Security-focused Linux distribution with 140+ tools, custom kernel 6.17.13, AI assistant | 5 editions | Cloud, AI/ML, Automotive, Hard…☆40Mar 27, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Newton inspired light theme for Mailspring☆12Nov 7, 2019Updated 6 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 9 years ago
- Activist Database Project☆13Mar 22, 2026Updated 2 weeks ago
- A variety of Dynamic Governance (aka Sociocracy, Holacracy, etc) documents available under Free Cultural Work licenses (CC-BY, CC-BY-SA, …☆12Jul 24, 2016Updated 9 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 7 months ago