grugq / security_guidesLinks
Collected and authored guides for personal and operational security.
☆61Updated 2 years ago
Alternatives and similar repositories for security_guides
Users that are interested in security_guides are comparing it to the libraries listed below
Sorting:
- A memorial site for Hackers and Infosec people who have passed☆136Updated 2 months ago
- Awesome Operational Security resources☆43Updated 8 years ago
- Offensive OSINT☆33Updated 4 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆47Updated last year
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- The open ransomware payment tracker☆97Updated 8 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 9 months ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- Papers, presentations and documents from the team at Hacker House.☆51Updated 5 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- iWar - The intelligent war dialer.☆28Updated 5 years ago
- Repository containing useful links for all things Physical Security. Please contribute!☆92Updated 4 years ago
- NoirGate provides on-demand ephemeral anonymous shells secured by TOTP☆34Updated last year
- A collection of tools created for computer security research purposes.☆125Updated 5 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆25Updated 4 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Daily updates from leaked data search engines, aggregators and similar services.☆111Updated last week
- Man in the Browser Framework☆50Updated 7 months ago
- Repository of tools and resources for analyzing Docker containers☆66Updated last year
- Still point in moving world.☆51Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆120Updated 9 months ago
- ☆22Updated 5 months ago
- Hashes of infamous malware☆26Updated 2 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- Red Team tools, infrastructure, and hardware weaponized☆106Updated last month
- This repository is my own list of tools / useful stuff for pentest, defensive activities, programming, lockpicking and physical security☆60Updated 2 years ago
- Second Part To Hell's artworks: artificial (life/evolution/intelligence)☆179Updated last year
- URL fingerprinting made easy☆87Updated last year
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago