grugq / security_guides
Collected and authored guides for personal and operational security.
☆61Updated 2 years ago
Alternatives and similar repositories for security_guides:
Users that are interested in security_guides are comparing it to the libraries listed below
- DEbian Cve REproducer Tool☆22Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 5 months ago
- A tool to use novel locations to extract metadata from Office documents.☆62Updated last year
- Offensive OSINT☆31Updated 4 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- ☆28Updated 2 months ago
- Repository containing useful links for all things Physical Security. Please contribute!☆88Updated 3 years ago
- A simple yet beautiful phishing proxy.☆52Updated 3 years ago
- I wrote a book about privacy and OPSEC, so here it is.☆67Updated 5 years ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆32Updated last year
- Tools that trigger False Positive AV alerts☆44Updated 3 months ago
- Papers, presentations and documents from the team at Hacker House.☆50Updated 5 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13Updated 4 years ago
- ☆20Updated last month
- Posts about different topics☆36Updated last year
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- sudo-parser is a tool to audit complex sudoers files☆17Updated 2 years ago
- A memorial site for Hackers and Infosec people who have passed☆132Updated last week
- Just my findings of malwares☆44Updated 2 years ago
- Awesome Operational Security resources☆43Updated 8 years ago
- Hashes of infamous malware☆26Updated last year
- A tool to assist with network-based hunting for GRU's Drovorub malware c2☆25Updated 4 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Nmap and NSE command line wrapper in the style of Metasploit☆41Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆113Updated 3 years ago
- Deployment code for ashirt-server☆19Updated last year
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆20Updated last year
- Selenium based web scraper to generate passwords list☆51Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- A list of books suggested by the security community to aid intelligence analysts learn to think☆28Updated last year