w8mej / PoorOperationalSecurityPracticesLinks
Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.
☆13Updated last year
Alternatives and similar repositories for PoorOperationalSecurityPractices
Users that are interested in PoorOperationalSecurityPractices are comparing it to the libraries listed below
Sorting:
- ☆39Updated 7 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 10 years ago
- Maltego integration of https://abusix.com☆17Updated 7 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Network white noise collector☆19Updated 9 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆34Updated 10 years ago
- ☆58Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Maltego Transforms to Query Traffic Records☆34Updated 9 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 7 years ago
- A static website template for security pages.☆53Updated last month
- ☆15Updated 5 years ago
- Single-threaded epoll-based concurrent bulk whois client☆31Updated 7 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆22Updated 8 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Truehunter☆31Updated 4 years ago
- Docker container for datasploit framework☆26Updated 8 years ago
- Port scanning and domain utility.☆30Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 7 years ago
- Chef repository for pentesting tools☆13Updated 8 years ago
- A very simple Python script to take screenshots of websites☆18Updated 8 years ago