lawfareblog / hacking-cybersecurityLinks
Hacking & Cybersecurity class materials - Scott J. Shapiro & Sean O'Brien
☆85Updated 2 years ago
Alternatives and similar repositories for hacking-cybersecurity
Users that are interested in hacking-cybersecurity are comparing it to the libraries listed below
Sorting:
- A very opinionated list of security tools☆128Updated 8 months ago
- Code that goes along with the Hacks, Leaks, and Revelations book☆178Updated 3 months ago
- This repository brings together tool builders, bloggers, speakers, book authors, and other interesting Mastodon accounts☆132Updated 2 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆135Updated 2 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Updated 2 years ago
- A list of books suggested by the security community to aid intelligence analysts learn to think☆28Updated 2 years ago
- High signal information security sources Goggle.☆67Updated 2 years ago
- Information for accessing The Cyber Plumber's Handbook Lab☆31Updated 3 years ago
- List of links and resources referred to in my SANS OSINT Summit 2023 Talk: "Tips & Tricks For Digital Dumpster Diving"☆40Updated 2 years ago
- ☆37Updated 4 years ago
- Tool to build and export timelines☆35Updated last year
- A command line tool that queries the Open Corporates Database and returns data on corporations under the copyleft Open Database License.☆33Updated 2 years ago
- URL fingerprinting made easy☆89Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆51Updated 5 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated 2 months ago
- Technical Tabletop Exercises Simulation Framework☆48Updated 2 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆52Updated this week
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 5 years ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆28Updated 2 years ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆54Updated last year
- The OSINT Field Manual☆151Updated 10 months ago
- Extension to standardize dates and times to the same timezone across social media websites.☆33Updated 4 months ago
- Resources, tools and utilities about Threat Intelligence☆74Updated 2 years ago
- Grap information for multiple IP Addresses including lat/long, city, state, and if the IP is owned by a VPN.☆29Updated 4 years ago
- MatterBot is a two-part extensible Python bot framework that provides a scheduled feed of information sources to your Mattermost channel(…☆37Updated 2 weeks ago
- ☆30Updated 2 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆43Updated 5 years ago
- List of GREP modifications and alternatives for a variety of purposes☆132Updated 9 months ago