jermanuts / bad-opsec
Collection of links on bad opsec
☆88Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for bad-opsec
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆109Updated 9 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆48Updated 3 weeks ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆59Updated 10 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆33Updated 8 months ago
- Capture screenshots of onion services on an onion service.☆49Updated 5 months ago
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).☆109Updated 9 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆116Updated 3 weeks ago
- Tor onion address lookup☆32Updated last month
- information about ransomware groups (Ransomware Analysis Notes)☆35Updated 10 months ago
- A collection of tools that I use in CTF's or for assessments☆59Updated last month
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆85Updated 7 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆128Updated last year
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆46Updated 11 months ago
- 🕵️ Email osint tool☆60Updated last year
- God Mode Detection Rules☆131Updated 3 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 6 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆140Updated 2 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆180Updated 2 months ago
- A curated list of OSINT tools for company research, internet scanning, DNS, and Whois lookups, organized for easy access. Ideal for analy…☆136Updated 2 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆42Updated 2 weeks ago
- Regular Expressions List used in Digital Forensic Tasks☆74Updated 9 months ago
- The Darknet Market Bible☆23Updated 3 months ago
- Operation Archive - Saving the history behind Cybercriminal Arrests, Documentation, Raids, Seizures, and more!☆21Updated last month
- AI Powered Terminal Based Ethical Hacking Assistant☆51Updated 6 months ago
- Public repository containing materials for various malware-related streams.☆26Updated last month
- DEFCON 31 slide deck and video link☆58Updated 4 months ago