phretor / infosec-opmlLinks
My very personal and opinionatedly organized infosec/cybersec sources in one OPML file
☆58Updated 2 years ago
Alternatives and similar repositories for infosec-opml
Users that are interested in infosec-opml are comparing it to the libraries listed below
Sorting:
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Updated last year
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆50Updated last year
- ☆116Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated 2 years ago
- ☆25Updated 5 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago
- ☆60Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆81Updated 2 years ago
- Random things for my own reference☆22Updated 3 years ago
- Signature based honeypot detector tool written in Golang☆107Updated 8 months ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated 2 years ago
- A MITRE ATT&CK Lookup Tool☆46Updated last year
- ☆114Updated 2 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆90Updated 3 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆58Updated 8 months ago
- Examine Chrome extensions for security issues☆88Updated 3 weeks ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- Repository of tools and resources for analyzing Docker containers☆71Updated 2 years ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- A tool to use novel locations to extract metadata from Office documents.☆64Updated 2 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- ☆94Updated 3 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 3 years ago
- ☆63Updated 2 years ago