Collection of links on bad opsec
☆481May 31, 2024Updated last year
Alternatives and similar repositories for bad-opsec
Users that are interested in bad-opsec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 3 months ago
- ☆20Sep 6, 2025Updated 7 months ago
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 4 months ago
- Generate backdoored RSA keys using SETUP☆236Dec 1, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆164Oct 25, 2023Updated 2 years ago
- Proof of concept for Kerberos Armoring abuse.☆82Dec 12, 2025Updated 4 months ago
- A list and guide of OSINT/OPSEC and some tools that I've made and or use.☆81Apr 4, 2026Updated 2 weeks ago
- The most average C2 ever (MACE)☆98Apr 9, 2022Updated 4 years ago
- A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code se…☆54Nov 3, 2025Updated 5 months ago
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆22May 3, 2025Updated 11 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆17Mar 4, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆413Jan 11, 2026Updated 3 months ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Step-by-step guide to building a custom machine for OSINT activities. The Basic Package includes a robust LINUX system strengthening proc…☆131Feb 22, 2024Updated 2 years ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆18Jan 23, 2025Updated last year
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆36May 1, 2025Updated 11 months ago
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆58Jan 17, 2026Updated 3 months ago
- ☆59Dec 10, 2025Updated 4 months ago
- ☆61Oct 24, 2025Updated 5 months ago
- Analyse your malware to surgically obfuscate it☆527Dec 17, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- OFFZONE 2024 Malware Persistence workshop☆22Dec 18, 2024Updated last year
- The Life Operational Security (OpSec) Guide provides invaluable insights and actionable recommendations for individuals seeking to enhanc…