jermanuts / bad-opsecLinks
Collection of links on bad opsec
☆99Updated last year
Alternatives and similar repositories for bad-opsec
Users that are interested in bad-opsec are comparing it to the libraries listed below
Sorting:
- ☆49Updated 7 months ago
- A repository of credential stealer formats☆227Updated 4 months ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆138Updated last year
- Capture screenshots of onion services on an onion service.☆71Updated last year
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆39Updated last year
- Tor onion address lookup☆55Updated last month
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆48Updated 9 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆52Updated 7 months ago
- A Repository to Track Anti-Forensic Techniques☆112Updated 2 years ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆41Updated 5 months ago
- Wordlist to crack .zip-file password☆205Updated 3 years ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆54Updated 2 weeks ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆100Updated last month
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆46Updated 2 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆127Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 10 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- Tool designed to exfiltrate OneDrive Business OCR Data☆124Updated 8 months ago
- Operation Archive - Saving the history behind Cybercriminal Arrests, Documentation, Raids, Seizures, and more!☆56Updated 3 weeks ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆66Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- A list of useful tools for Malware Analysis (will be updated regularly)☆144Updated 2 months ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆71Updated last week
- Collection of my Security Blueprints & Guides☆51Updated last week
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year
- This is a collection of Worms for educational purposes☆32Updated 2 months ago
- A repository preserving darknet market data, including vendor lists, PGP keys, listings, and more for research & intelligence purposes.☆43Updated 3 months ago