OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations
☆21Jul 4, 2017Updated 8 years ago
Alternatives and similar repositories for OpSec-In-OSINT
Users that are interested in OpSec-In-OSINT are comparing it to the libraries listed below
Sorting:
- Technical Notes☆16Dec 1, 2017Updated 8 years ago
- Checklist of simple and not so simple things to enhance your OPSEC.☆20Jul 24, 2018Updated 7 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Jun 6, 2023Updated 2 years ago
- eqgrp-auction decrypted☆13Apr 15, 2017Updated 8 years ago
- Python bindings for Avast antivirus server version for Linux☆15Apr 26, 2014Updated 11 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- A collection of Open Data for the data freaks out there.☆37Jan 4, 2018Updated 8 years ago
- Example agents for the Dreadnode platform☆22Dec 19, 2025Updated 2 months ago
- ☆14Mar 31, 2018Updated 7 years ago
- ☆12Nov 21, 2023Updated 2 years ago
- Mobile Pentest related stuff☆14Jun 14, 2017Updated 8 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- ☆20Sep 25, 2017Updated 8 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Dec 12, 2017Updated 8 years ago
- List of Red Team Repositories☆17Feb 26, 2019Updated 7 years ago
- Tool to predict attacker groups from the techniques and software used☆49Aug 4, 2021Updated 4 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- A smali emulator.☆25Jun 27, 2018Updated 7 years ago
- ☆22Jan 2, 2018Updated 8 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- fun rootkits stuff!☆20Jul 28, 2015Updated 10 years ago
- ☆28Apr 3, 2018Updated 7 years ago
- Domain fronting using Google app engine☆53Feb 19, 2018Updated 8 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- My personal Automated Malware Analysis Sandboxes and Services☆24Mar 26, 2017Updated 8 years ago
- Fork of: https://gitweb.torproject.org/user/jvoisin/mat.git☆25Sep 26, 2011Updated 14 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- Using Ansible as an orchestrator, this project is another solution for testers looking to configure and deploy a new VM or VPS box with t…☆20Dec 3, 2017Updated 8 years ago
- Dragon Sandbox☆81Apr 1, 2013Updated 12 years ago
- Block Windows Defender by deny ACL☆77Jan 12, 2026Updated last month
- Scripts and tool for iOS app reversing☆27Oct 1, 2021Updated 4 years ago