straightfromtheunderground / opsec-notesLinks
OPSEC related notes from various sources
☆17Updated 10 years ago
Alternatives and similar repositories for opsec-notes
Users that are interested in opsec-notes are comparing it to the libraries listed below
Sorting:
- OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations☆21Updated 8 years ago
- Hacking environment installation scripts for OS X☆28Updated 3 years ago
- Hacker OPSEC☆99Updated 7 years ago
- Network white noise collector☆19Updated 9 years ago
- Find useful stuff in pastebin☆23Updated 12 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆47Updated 3 years ago
- Password cracking utility☆53Updated 4 years ago
- Local Transforms for the Maltego OSINT investigative tool that act on FetLife.com.☆39Updated 5 years ago
- log file scrubber☆16Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- Python script for peforming basic Evil Twin attacks on open wifi networks. Written for my tutorial on the subject.☆38Updated 9 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- Maltego Local Transforms for Facebook☆75Updated 7 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Updated 12 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆37Updated 10 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Updated 10 years ago
- Maltego Transforms, Machines and other extentions☆44Updated 10 years ago
- ☆63Updated 9 years ago
- Use Tor for anonymous scanning with nmap☆85Updated 10 years ago
- Search google for shellshock vulnerable sites☆27Updated 11 years ago
- Python - Human Interface Device Android Attack Framework☆47Updated 8 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Updated 8 years ago
- (Abandoned) Extract packages from an Android device☆52Updated 4 years ago
- A copy of articles published at Peerlyst☆40Updated 8 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago