tjnull / TJ-OSINT-Notebook
This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations when it comes to performing reconaissance and OSINT operations. This Notebook has helped me in many situations to learn more about OSINT and how to analyze the data that is out there on the internet.
☆340Updated 6 months ago
Alternatives and similar repositories for TJ-OSINT-Notebook:
Users that are interested in TJ-OSINT-Notebook are comparing it to the libraries listed below
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆238Updated 2 years ago
- This a notes/handbook i made and gathered from a great resources on the internet. It consist of a very detailed cheat sheets and useful c…☆156Updated 2 years ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆226Updated last year
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆202Updated 2 months ago
- A list of bookmarks I have used since I started my journey in cyber security☆283Updated 2 years ago
- The OSINT Field Manual☆108Updated last month
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 9 months ago
- ☆236Updated 3 weeks ago
- Pentest Report Generator☆394Updated this week
- A categorized list of resources presented during the 2023 Sans OSINTSummit☆161Updated last year
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆640Updated last year
- Tools & Resources for Cyber Security Operations☆215Updated last month
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆179Updated this week
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆209Updated 2 years ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆136Updated 11 months ago
- ☆419Updated 5 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆193Updated 7 months ago
- Bootstraps, cheat-sheets, and guides for the OSCP exam.☆90Updated 9 months ago
- Active Directory pentesting mind map☆386Updated last year
- A RedTeam Toolkit☆394Updated 3 months ago
- Practical Windows Forensics Training☆643Updated 11 months ago
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- Jupyter Notebooks for the Blue Team☆145Updated 2 years ago
- PNPT Exam Preparation - TCM Security☆163Updated 3 years ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆348Updated 3 weeks ago
- ☆422Updated 2 years ago
- A checklist to help students track their OSCP exercise progress.☆146Updated 2 years ago
- Knowledge Management for Offensive Security Professionals Official Repository☆134Updated last month
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆645Updated 4 months ago
- ☆164Updated last month