triclorne / simple-opsecView external linksLinks
A list of resources for the security conscious tech-users. Operation security, incident response and help guides.
☆35Dec 5, 2017Updated 8 years ago
Alternatives and similar repositories for simple-opsec
Users that are interested in simple-opsec are comparing it to the libraries listed below
Sorting:
- Collection of various materials on operational security.☆23Nov 15, 2016Updated 9 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆16Aug 11, 2023Updated 2 years ago
- A powershell script for creating a Windows honeyport.☆12Jun 24, 2015Updated 10 years ago
- a port made of honey for blocking people☆13Jun 24, 2020Updated 5 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Pluto - A multi-sport betting bot for Discord☆21Feb 6, 2026Updated last week
- Repository for the WACV 2024 paper "PsyMo: A Dataset for Estimating Self-Reported Psychological Traits from Gait"☆13Feb 22, 2024Updated last year
- ☆15Aug 13, 2014Updated 11 years ago
- ☆11Apr 2, 2022Updated 3 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Great tools create great masterpieces. Our goal is to introduce great tools and resources that definitely enhance your productivity.☆11Oct 25, 2025Updated 3 months ago
- Random scripts for azure stuff☆13Oct 12, 2022Updated 3 years ago
- ☆13Aug 31, 2024Updated last year
- Collection of red team scripts, resources & configs.☆15May 9, 2025Updated 9 months ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- API Hooking Engine on Windows 10☆12May 10, 2024Updated last year
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- Advanced Phishing Attack.☆11Aug 26, 2020Updated 5 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Command-line tool to format and syntax highlight Suricata rules☆13Nov 30, 2019Updated 6 years ago
- Fully undetected grabber (grabs wallets, passwords, cookies, modifies discord client etc.)☆44Sep 19, 2022Updated 3 years ago
- ☆16Apr 16, 2017Updated 8 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- general framework for creating robots, worms, and backdoors☆11Nov 13, 2017Updated 8 years ago
- A simple multi-process HTTP/HTTPS tunnel proxy, supports Basic authentication.☆13Apr 18, 2018Updated 7 years ago
- Blocking smartscreen, security center, forensic processes and 3rd party security applications on Windows Operating Systems☆15Jun 10, 2022Updated 3 years ago
- ☆20Aug 18, 2020Updated 5 years ago
- Coinlen is a cryptocurrency exchange tracking system. ♡ This project was built in Dumaguete City, Negros Oriental , Philippines. ♡☆14Jan 30, 2021Updated 5 years ago
- Modify data structures in the Windows kernel, hiding processes by PID☆16Oct 29, 2017Updated 8 years ago
- Cobalt Strike Aggressor Script Collection☆19Mar 30, 2018Updated 7 years ago
- a collection of teaching resources☆12Feb 27, 2018Updated 7 years ago
- A forked opensource stego tool, primary URL: http://www.petitcolas.net/steganography/mp3stego/☆11Dec 5, 2018Updated 7 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- ClipBanker Spy Trojan☆11Sep 10, 2024Updated last year
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆13Aug 29, 2016Updated 9 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Jul 8, 2019Updated 6 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆17Jul 11, 2021Updated 4 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17May 11, 2025Updated 9 months ago