phretor / infosec-opmlLinks
My very personal and opinionatedly organized infosec/cybersec sources in one OPML file
☆59Updated 3 years ago
Alternatives and similar repositories for infosec-opml
Users that are interested in infosec-opml are comparing it to the libraries listed below
Sorting:
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Updated last year
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆50Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- ☆60Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Updated last month
- DEbian Cve REproducer Tool☆27Updated last week
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Examine Chrome extensions for security issues☆92Updated 2 months ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- ☆116Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- Provides an overview of the inner file structure of a PDF☆24Updated 3 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆43Updated 3 years ago
- Collection of Tools & Techniques for analyzing URLs☆33Updated 2 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- A tool to use novel locations to extract metadata from Office documents.☆64Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated this week
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 3 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆94Updated 3 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- SMBScan is a tool to enumerate file shares on an internal network.☆49Updated last month
- urlyzer is a URL parsing analysis tool.☆24Updated last year
- ☆25Updated 7 months ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Updated 5 months ago
- ☆50Updated last year
- ☆80Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated last month