triclorne / simple-opsecLinks
A list of resources for the security conscious tech-users. Operation security, incident response and help guides.
☆35Updated 8 years ago
Alternatives and similar repositories for simple-opsec
Users that are interested in simple-opsec are comparing it to the libraries listed below
Sorting:
- This repository contains scrapers programs to scrape hacking forums from Dark web☆63Updated 5 years ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆45Updated 2 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆193Updated 6 years ago
- ☆67Updated 2 years ago
- Notes for efficient and easier engagements - notes over time☆24Updated 4 years ago
- A proof of concept email spoofing tool built on Docker.☆129Updated 4 years ago
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆65Updated last year
- A PasteBin scrapper that doesnt rely on the PasteBin scrape API☆74Updated 3 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Updated 2 years ago
- XENA is an innovative C2 made fully in Go. With hacking automation features.☆383Updated 9 months ago
- capNcook - a dark web exploration tool☆123Updated last year
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆77Updated 3 years ago
- The Life Operational Security (OpSec) Guide provides invaluable insights and actionable recommendations for individuals seeking to enhanc…☆366Updated last week
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆102Updated 2 years ago
- Proof of concept denial of service over TOR stress test tool☆42Updated 7 years ago
- GitHub - Stealerium/Stealerium: Stealer + Clipper + Keylogger☆79Updated 2 years ago
- Collection Of LolSec☆37Updated 6 years ago
- Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)☆342Updated 2 years ago
- Helping you delete your old accounts☆86Updated 2 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆178Updated 3 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆109Updated 2 years ago
- Emagnet is a tool for find leaked databases with 97.1% accurate to grab mail + password together from pastebin leaks. Support for brute f…☆232Updated 2 years ago
- PrivacyNet: Privacy Network☆54Updated last year
- TorghostNG - Make all your internet traffic anonymized with Tor network. Rewritten from TorGhost with Python 3☆57Updated 5 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆17Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆87Updated 4 years ago
- Find Real IPs hidden behind Cloudflare with Criminal IP(criminalip.io), security OSINT Tool.☆123Updated last year
- Create a fully undetectable backdoor with simple steps.☆77Updated 3 years ago
- Many times I have asked myself how to maintain access to a compromised WordPress site for the sake of surveillance/data gathering/etc... …☆26Updated last year