phretor / infosec-opmlLinks
My very personal and opinionatedly organized infosec/cybersec sources in one OPML file
☆57Updated 2 years ago
Alternatives and similar repositories for infosec-opml
Users that are interested in infosec-opml are comparing it to the libraries listed below
Sorting:
- ☆116Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated 2 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆35Updated 9 months ago
- Examine Chrome extensions for security issues☆85Updated last month
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆49Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- A ruleset to find potentially malicious code in macOS malware samples☆40Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- ☆94Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- DEbian Cve REproducer Tool☆26Updated last month
- All kinds of tiny shells☆58Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆89Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 9 months ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- ☆22Updated 3 months ago
- Reads and prints information from the website MalAPI.io☆39Updated 3 years ago
- ☆113Updated 2 years ago
- Volatility MindMap & Cheat Sheet☆29Updated 3 years ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- ☆80Updated 2 years ago
- Some of my rough notes for Docker threat detection☆47Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Signature based honeypot detector tool written in Golang☆103Updated 5 months ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago