tjnull / TJ-OSINT-NotebookLinks
This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations when it comes to performing reconaissance and OSINT operations. This Notebook has helped me in many situations to learn more about OSINT and how to analyze the data that is out there on the internet.
☆346Updated 9 months ago
Alternatives and similar repositories for TJ-OSINT-Notebook
Users that are interested in TJ-OSINT-Notebook are comparing it to the libraries listed below
Sorting:
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆235Updated 2 weeks ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆244Updated 2 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆213Updated 6 months ago
- Bootstraps, cheat-sheets, and guides for the OSCP exam.☆91Updated last year
- ☆241Updated 4 months ago
- A checklist to help students track their OSCP exercise progress.☆145Updated 2 years ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆394Updated 3 weeks ago
- Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydr…☆187Updated last year
- Tools & Resources for Cyber Security Operations☆230Updated 2 weeks ago
- Trace Labs - Search Party CTF Writeups☆94Updated 6 months ago
- The OSINT Field Manual☆118Updated 4 months ago
- A list of bookmarks I have used since I started my journey in cyber security☆284Updated 2 years ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆144Updated last year
- A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers☆239Updated this week
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.☆252Updated 7 months ago
- A living document for penetration testing and offensive security.☆297Updated 11 months ago
- Practical Windows Forensics Training☆665Updated last year
- ☆425Updated 9 months ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆652Updated last year
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆211Updated 2 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- ☆267Updated last year
- Knowledge Management for Offensive Security Professionals Official Repository☆143Updated 3 months ago
- ☆339Updated 2 years ago
- List of red team resources☆95Updated 7 years ago
- Jupyter Notebooks for the Blue Team☆144Updated 2 months ago
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆672Updated last month
- Resources for Students in the Practical Webapp Security and Testing course☆167Updated last year
- Short checklists for penetration testing methodology☆190Updated last year
- Pentest Report Generator☆409Updated this week