OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations
☆21Jul 4, 2017Updated 8 years ago
Alternatives and similar repositories for OpSec-In-OSINT
Users that are interested in OpSec-In-OSINT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of various materials on operational security.☆25Nov 15, 2016Updated 9 years ago
- OPSEC related notes from various sources☆17Jun 22, 2015Updated 10 years ago
- Checklist of simple and not so simple things to enhance your OPSEC.☆20Jul 24, 2018Updated 7 years ago
- A continuously curated list of my favorite links and resources relating to Open Source Intelligence gathering.☆18Jul 10, 2018Updated 7 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A passive network discovery tool that finds live network nodes by analyzing ARP and broadcast packets.☆14Dec 11, 2012Updated 13 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Dec 12, 2017Updated 8 years ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago
- Penetration research against NSFW websites☆13Dec 1, 2016Updated 9 years ago
- Python bindings for Avast antivirus server version for Linux☆15Apr 26, 2014Updated 12 years ago
- ☆14Mar 31, 2018Updated 8 years ago
- eqgrp-auction decrypted☆13Apr 15, 2017Updated 9 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Phishing Campaign Toolkit☆13Nov 9, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- ☆13Jun 13, 2016Updated 9 years ago
- A collection of Open Data for the data freaks out there.☆37Jan 4, 2018Updated 8 years ago
- On-demand and reusable contact forms that only send GnuPG-encrypted messages to your inbox.☆13Jul 4, 2018Updated 7 years ago
- Firefox Addon to fool websites with spoofed X-Forwarded-For headers☆18Oct 13, 2013Updated 12 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- ☆12Nov 21, 2023Updated 2 years ago
- Awesome Operational Security resources☆46Dec 2, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- fun rootkits stuff!☆20Jul 28, 2015Updated 10 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- ☆20Sep 25, 2017Updated 8 years ago
- List of Red Team Repositories☆17Feb 26, 2019Updated 7 years ago
- Protest organizing application☆67Oct 18, 2019Updated 6 years ago
- Scapy tools and scripts☆20Jun 19, 2020Updated 5 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Vulnerable ASP based Web Application☆18Jan 25, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Just a proof of concept Linux rootkit that reads from syscalls.☆24Jun 22, 2018Updated 7 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- Open Source Intelligence☆25Feb 25, 2017Updated 9 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- Activist Database Project☆13Updated this week
- ☆10Oct 22, 2017Updated 8 years ago
- ☆22Jan 2, 2018Updated 8 years ago