Collection of various materials on operational security.
☆23Nov 15, 2016Updated 9 years ago
Alternatives and similar repositories for OPSEC
Users that are interested in OPSEC are comparing it to the libraries listed below
Sorting:
- Checklist of simple and not so simple things to enhance your OPSEC.☆20Jul 24, 2018Updated 7 years ago
- OPSEC related notes from various sources☆17Jun 22, 2015Updated 10 years ago
- Awesome Operational Security resources☆47Dec 2, 2016Updated 9 years ago
- OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations☆21Jul 4, 2017Updated 8 years ago
- I wrote a book about privacy and OPSEC, so here it is.☆66Aug 24, 2019Updated 6 years ago
- ☆12Jun 12, 2021Updated 4 years ago
- ☆15Nov 22, 2023Updated 2 years ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- ☆10May 8, 2021Updated 4 years ago
- Deploy your DNS configuration using GitHub Actions using DNSControl.☆11Feb 19, 2026Updated last week
- website of cheating daddy dot com☆17Feb 9, 2026Updated 3 weeks ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- Engineering Guidance and Standards for the Home Office☆21Updated this week
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- This is a gui interface for airmon-ng☆14Mar 23, 2023Updated 2 years ago
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- Hacker OPSEC☆102Apr 12, 2018Updated 7 years ago
- This Project is in process and i will start working on it this weekend. It is used to call victims with a botvoice to ask for their 2fa c…☆10Mar 28, 2022Updated 3 years ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- KQL queries for Microsoft Defender Advanced Hunting organized around the TTPs of the MITRE ATT&CK framework.☆18Nov 7, 2024Updated last year
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago
- sample code to perform aave flashloan with OrFeed https://docs.aave.com/developers/tutorials/performing-a-flash-loan☆10Jan 24, 2023Updated 3 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- Exploits weaknesses in RC4 to mount a chosen-plaintext attack and recover the private key. The vulnerability is similar to the one used t…☆12Nov 22, 2022Updated 3 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- The backend for the rewritten hidden tear ransomware☆10May 22, 2024Updated last year
- This app helps the farmers to convert from a food crop to a commercial crop by providing a full fledged cost and risk analysis.☆10Nov 4, 2018Updated 7 years ago
- A list of OSINT resources tools that may be useful to you when conducting investigations related to Australia☆23May 13, 2025Updated 9 months ago
- ☆13Apr 16, 2025Updated 10 months ago
- a github repo that will be used for teaching bash optimizations in a youtube series☆10Jul 6, 2021Updated 4 years ago
- An Ansible playbook that installs Kubernetes☆14Jan 2, 2026Updated 2 months ago
- Lost and Found: Stopping Bluetooth Finders from Leaking Private Information☆14Apr 22, 2022Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- Real-World DevOps Project From Start To Finish, by Packt Publishing☆14Dec 2, 2024Updated last year
- Ansible role to build an Onion Pi Tor proxy with a Raspberry Pi 4 Model 4 B☆11Dec 12, 2021Updated 4 years ago
- ☆12Feb 16, 2024Updated 2 years ago
- Create graphed invoice for Google Cloud Platform. You can see billing amount per GCP project.☆11Feb 28, 2022Updated 4 years ago