grugq / security_guidesLinks
Collected and authored guides for personal and operational security.
☆66Updated 2 years ago
Alternatives and similar repositories for security_guides
Users that are interested in security_guides are comparing it to the libraries listed below
Sorting:
- Awesome Operational Security resources☆45Updated 8 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆49Updated last year
- A memorial site for Hackers and Infosec people who have passed☆138Updated 2 weeks ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 11 months ago
- Repository containing useful links for all things Physical Security. Please contribute!☆94Updated 4 years ago
- Papers, presentations and documents from the team at Hacker House.☆51Updated 6 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- DEbian Cve REproducer Tool☆27Updated 2 months ago
- Still point in moving world.☆50Updated 2 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- The open ransomware payment tracker☆99Updated last month
- Offensive OSINT☆33Updated 5 years ago
- A simple yet beautiful phishing proxy.☆57Updated 4 years ago
- Repository of tools and resources for analyzing Docker containers☆68Updated last year
- A tool to use novel locations to extract metadata from Office documents.☆64Updated 2 years ago
- A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard☆31Updated 2 years ago
- List of sources for cybersecurity news☆39Updated 2 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆25Updated 5 years ago
- Second Part To Hell's artworks: artificial (life/evolution/intelligence)☆182Updated last year
- king of the hill cybersecurity competition☆32Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated 11 months ago
- URL fingerprinting made easy☆89Updated last year
- ☆24Updated 7 months ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆22Updated 2 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- Your go-to resource for all things OSINT☆180Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago