jermanuts / bad-opsecLinks
Collection of links on bad opsec
☆100Updated last year
Alternatives and similar repositories for bad-opsec
Users that are interested in bad-opsec are comparing it to the libraries listed below
Sorting:
- Capture screenshots of onion services on an onion service.☆71Updated last year
- Tor onion address lookup☆51Updated last week
- ☆48Updated 6 months ago
- information about ransomware groups (Ransomware Analysis Notes)☆38Updated last year
- Collection of my Security Blueprints & Guides☆51Updated last month
- Operation Archive - Saving the history behind Cybercriminal Arrests, Documentation, Raids, Seizures, and more!☆57Updated 2 months ago
- A repository of credential stealer formats☆224Updated 2 months ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆133Updated last year
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆48Updated 7 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆55Updated 4 months ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 8 months ago
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆46Updated 2 years ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆52Updated 5 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Updated last year
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- Wordlist to crack .zip-file password☆204Updated 3 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Modular framework for automating triaging, malware analysis, and analyst workflows☆42Updated 3 months ago
- A repository preserving darknet market data, including vendor lists, PGP keys, listings, and more for research & intelligence purposes.☆43Updated 2 months ago
- A Repository to Track Anti-Forensic Techniques☆111Updated 2 years ago
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆61Updated 10 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆51Updated last month
- hiding in plain sight: part 2☆45Updated last year
- A meta-list of public references to threat actor profiles and APT group datasets.☆68Updated 2 months ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Palestine.☆29Updated last year
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆88Updated 2 weeks ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆17Updated 3 weeks ago
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆81Updated 3 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year