phretor / infosec-opmlLinks
My very personal and opinionatedly organized infosec/cybersec sources in one OPML file
☆58Updated 2 years ago
Alternatives and similar repositories for infosec-opml
Users that are interested in infosec-opml are comparing it to the libraries listed below
Sorting:
- An LLM and OCR based Indicator of Compromise Extraction Tool☆36Updated 10 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 10 months ago
- Examine Chrome extensions for security issues☆85Updated 2 months ago
- ☆116Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- Provides an overview of the inner file structure of a PDF☆25Updated 3 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- ☆60Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- ☆114Updated 2 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆59Updated 3 months ago
- InfoSec OpenAI Examples☆19Updated last year
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆49Updated last year
- All kinds of tiny shells☆58Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆90Updated 3 years ago
- Volatility MindMap & Cheat Sheet☆29Updated 3 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆36Updated last month
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- Repository of tools and resources for analyzing Docker containers☆70Updated last year
- ☆94Updated 3 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆22Updated 2 years ago