grugq / security_guidesLinks
Collected and authored guides for personal and operational security.
☆61Updated 2 years ago
Alternatives and similar repositories for security_guides
Users that are interested in security_guides are comparing it to the libraries listed below
Sorting:
- Offensive OSINT☆32Updated 4 years ago
- DEbian Cve REproducer Tool☆24Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆86Updated 2 years ago
- Repository containing useful links for all things Physical Security. Please contribute!☆91Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- A memorial site for Hackers and Infosec people who have passed☆135Updated last month
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆52Updated 4 years ago
- recon-ng modules for Censys☆37Updated last year
- ☆17Updated 3 years ago
- Team hashcat event writeups and tools☆49Updated 8 months ago
- Awesome Operational Security resources☆44Updated 8 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- Malware vulnerability intel tool for third-party attackers☆119Updated 7 months ago
- Curated list of awesome, open source data exfiltration tools☆56Updated 3 years ago
- ☆90Updated 3 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆27Updated 3 years ago
- tool for identifying guest relationships between companies☆92Updated 11 months ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 2 years ago
- SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and T…☆11Updated 2 years ago
- Papers, presentations and documents from the team at Hacker House.☆51Updated 5 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆14Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- This is where we dump all the web 3 infromation☆40Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 7 months ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 6 months ago
- Still point in moving world.☆51Updated 2 years ago
- This repository is my own list of tools / useful stuff for pentest, defensive activities, programming, lockpicking and physical security☆58Updated 2 years ago