OPSEC related notes from various sources
☆17Jun 22, 2015Updated 10 years ago
Alternatives and similar repositories for opsec-notes
Users that are interested in opsec-notes are comparing it to the libraries listed below
Sorting:
- Collection of various materials on operational security.☆23Nov 15, 2016Updated 9 years ago
- OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations☆21Jul 4, 2017Updated 8 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Hacker OPSEC☆102Apr 12, 2018Updated 7 years ago
- Scripts and tool for iOS app reversing☆27Oct 1, 2021Updated 4 years ago
- I wrote a book about privacy and OPSEC, so here it is.☆66Aug 24, 2019Updated 6 years ago
- Amazon-Aged-Account-Gen☆10Apr 7, 2023Updated 2 years ago
- OSINT Browser Plugins☆38Jun 9, 2017Updated 8 years ago
- Infracoders Packer+Vagrant workshop☆10May 14, 2018Updated 7 years ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- Python Visual Hash, generate a visual random image associated with a string.☆11Apr 23, 2017Updated 8 years ago
- This Project is in process and i will start working on it this weekend. It is used to call victims with a botvoice to ask for their 2fa c…☆10Mar 28, 2022Updated 3 years ago
- Examples related to Amazon Lightsail☆12Jul 17, 2024Updated last year
- Generate fake reviews using rnn and Yelp Datasets☆10Mar 18, 2017Updated 8 years ago
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 8 years ago
- A cli password storer and manager.☆10Sep 3, 2021Updated 4 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- In addition to providing a solution to create and manage custom security controls and frameworks this repository provide an integration o…☆12Nov 14, 2023Updated 2 years ago
- Automate Cisco LAN Switching Configuration using Ansible☆13Sep 4, 2020Updated 5 years ago
- ☆12Oct 15, 2016Updated 9 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Gather and compile open source threat intelligence feeds.☆40Feb 19, 2022Updated 4 years ago
- The app/website will help you keep an eye on nike shoes you want to cop☆10Mar 16, 2018Updated 7 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- A simple bash virus (without payload) for the second assignment of the "Malware analysis and design" course in Master Degree in Computer …☆13Oct 16, 2017Updated 8 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- Scraping darknet forums has been the object of research in the field of intelligence and security informatics. In this repository we scr…☆11May 18, 2023Updated 2 years ago
- Build an SSL capable transparent proxying WiFi Access point with budget commodity hardware and Open Source software.☆15Mar 1, 2013Updated 13 years ago
- A web-based, self-hosted Personal Information Manager (like Evernote), to store any information that cannot fit into your head, and not h…☆17Feb 9, 2011Updated 15 years ago
- Scrapes Adrian Cantrill's (cantrill.io) AWS courses and uploads the output to an S3 bucket hosting a static website☆12Sep 22, 2022Updated 3 years ago
- My Personal Library for CTF's☆12Apr 3, 2018Updated 7 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago
- Code from Bellingcat's guide☆11Dec 8, 2022Updated 3 years ago
- This app helps the farmers to convert from a food crop to a commercial crop by providing a full fledged cost and risk analysis.☆10Nov 4, 2018Updated 7 years ago