jermanuts / bad-opsec
Collection of links on bad opsec
☆92Updated 9 months ago
Alternatives and similar repositories for bad-opsec:
Users that are interested in bad-opsec are comparing it to the libraries listed below
- A repository of credential stealer formats☆202Updated this week
- ☆39Updated last month
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆124Updated last year
- Collection of my Security Blueprints & Guides☆42Updated last month
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆119Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆49Updated 2 weeks ago
- Capture screenshots of onion services on an onion service.☆48Updated 9 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 9 months ago
- ☆38Updated 3 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆292Updated last year
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆45Updated 2 months ago
- God Mode Detection Rules☆134Updated 7 months ago
- information about ransomware groups (Ransomware Analysis Notes)☆36Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆192Updated 2 months ago
- A delicious, but malicious SSL-VPN server 🌮☆215Updated 3 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆51Updated 3 weeks ago
- DEFCON 31 slide deck and video link☆58Updated 9 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆52Updated last month
- TRACE is a digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆159Updated last month
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 4 months ago
- A collection of tools that I use in CTF's or for assessments☆95Updated last month
- Tor onion address lookup☆38Updated last month
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 10 months ago
- Regular Expressions List used in Digital Forensic Tasks☆82Updated last month
- Canary Detection☆164Updated 11 months ago
- Advanced Email Threat Hunting w/ Detection as Code☆52Updated last month
- ☆64Updated last month
- Cheat sheet to detect and remove linux kernel rootkit☆52Updated 3 months ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆76Updated last month