hslatman / awesome-social-engineering
A curated list of awesome social engineering resources.
β15Updated 7 years ago
Alternatives and similar repositories for awesome-social-engineering:
Users that are interested in awesome-social-engineering are comparing it to the libraries listed below
- A collection of awesome penetration testing resources, tools and other shiny thingsβ17Updated 7 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Developmentβ12Updated 7 years ago
- π A curated list of resources for learning about vehicle security and car hackingβ14Updated 3 years ago
- A curated list of awesome threat detection and hunting resourcesβ10Updated 6 years ago
- A curated list of tools for incident responseβ19Updated 5 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.β24Updated 8 years ago
- A curated list of awesome forensic analysis tools and resourcesβ16Updated 6 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for tβ¦β14Updated 8 years ago
- A curated list of awesome big data frameworks, ressources and other awesomeness.β16Updated 3 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.β22Updated 6 years ago
- β11Updated 4 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap fileβ24Updated 2 years ago
- Recipes for GCHQ's CyberChef Web Appβ35Updated 6 years ago
- β29Updated 6 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online toolsβ26Updated 4 years ago
- A curated list of awesome threat detection and hunting resourcesβ17Updated 5 years ago
- A PowerShell Module Dedicated to Reverse Engineeringβ14Updated 5 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources tβ¦β52Updated 3 years ago
- β13Updated last year
- A few quick recipes for those that do not have much time during the dayβ22Updated 2 months ago
- Reference sheet for Threat Hunting Professional Courseβ25Updated 5 years ago
- An analytical framework for network traffic and behavioral analyticsβ22Updated last year
- Use DNS to hunt for threats including DGAsβ14Updated 9 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraformβ12Updated 4 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Miningβ31Updated 12 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.β12Updated 4 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can alβ¦β10Updated 2 years ago
- Hashes of infamous malwareβ25Updated last year
- β12Updated 2 years ago