jermanuts / bad-opsec
Collection of links on bad opsec
☆90Updated 7 months ago
Alternatives and similar repositories for bad-opsec:
Users that are interested in bad-opsec are comparing it to the libraries listed below
- Collection of my Security Blueprints & Guides☆38Updated 2 weeks ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- ☆31Updated 3 weeks ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆117Updated 10 months ago
- Regular Expressions List used in Digital Forensic Tasks☆77Updated 11 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆38Updated 10 months ago
- Tor onion address lookup☆34Updated 3 months ago
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).☆110Updated 11 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆47Updated 2 months ago
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆97Updated last year
- A repository of credential stealer formats☆129Updated this week
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆49Updated last year
- Capture screenshots of onion services on an onion service.☆50Updated 7 months ago
- A delicious, but malicious SSL-VPN server 🌮☆196Updated last month
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆79Updated 2 months ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆75Updated 2 months ago
- This repository brings together tool builders, bloggers, speakers, book authors, and other interesting Mastodon accounts☆128Updated last year
- The Life Operational Security (OpSec) Guide provides invaluable insights and actionable recommendations for individuals seeking to enhanc…☆108Updated 9 months ago
- ☆60Updated 8 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆130Updated 6 months ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆156Updated this week
- Strumenti di Acquisizione e Analisi di copie Forensi☆145Updated 9 months ago
- A collection of tools that I use in CTF's or for assessments☆80Updated this week
- ☆142Updated last year
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆130Updated 2 months ago
- ☆50Updated last year
- Windows Exploit Protection Settings (Ultimate)☆59Updated 2 months ago
- The program for scanning and testing city cameras (DVR, RTSP, Hikvision) is a tool developed exclusively for educational purposes to anal…☆85Updated last year
- Digital Forensics and Incident Response (DFIR)☆96Updated 3 weeks ago