Collection of links on bad opsec
☆480May 31, 2024Updated last year
Alternatives and similar repositories for bad-opsec
Users that are interested in bad-opsec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 4 months ago
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 5 months ago
- ☆24Sep 6, 2025Updated 8 months ago
- Generate backdoored RSA keys using SETUP☆236Dec 1, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆165Oct 25, 2023Updated 2 years ago
- Proof of concept for Kerberos Armoring abuse.☆83Dec 12, 2025Updated 4 months ago
- A list and guide of OSINT/OPSEC and some tools that I've made and or use.☆83Apr 4, 2026Updated last month
- The most average C2 ever (MACE)☆99Apr 9, 2022Updated 4 years ago
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆22May 3, 2025Updated last year
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 6 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 3 years ago
- A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code se…☆57Nov 3, 2025Updated 6 months ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆18Mar 4, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆412Jan 11, 2026Updated 3 months ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Step-by-step guide to building a custom machine for OSINT activities. The Basic Package includes a robust LINUX system strengthening proc…☆131Feb 22, 2024Updated 2 years ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆19Jan 23, 2025Updated last year
- Black Hat Asia 2026 Ghost Bits payload generate tools☆53Apr 29, 2026Updated last week
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆36May 1, 2025Updated last year
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆58Jan 17, 2026Updated 3 months ago
- ☆59Dec 10, 2025Updated 4 months ago
- ☆61Oct 24, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Analyse your malware to surgically obfuscate it☆527Dec 17, 2025Updated 4 months ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- Notion C2 Profile for Mythic☆45Apr 30, 2026Updated last week
- The Life Operational Security (OpSec) Guide provides invaluable insights and actionable recommendations for individuals seeking to enhanc…☆438Apr 17, 2026Updated 3 weeks ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆95Jul 7, 2025Updated 10 months ago
- OFFZONE 2024 Malware Persistence workshop☆24Dec 18, 2024Updated last year
- ☆37Jul 1, 2025Updated 10 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Different methods to get current username without using whoami☆186Feb 12, 2024Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 4 months ago
- Yoink is a quick tool for use with Obsidian that will allow you to take a markdown file and package it up into a folder that will allow y…☆17Aug 31, 2023Updated 2 years ago
- A Powerful XSS,RXSS,BXSS finding tool☆31Oct 29, 2025Updated 6 months ago
- Commandline spoofing on Windows☆101Nov 25, 2025Updated 5 months ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆313Dec 9, 2023Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆184Feb 2, 2026Updated 3 months ago