w8mej / PoorOperationalSecurityPracticesLinks
Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.
☆13Updated last year
Alternatives and similar repositories for PoorOperationalSecurityPractices
Users that are interested in PoorOperationalSecurityPractices are comparing it to the libraries listed below
Sorting:
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 10 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Network white noise collector☆19Updated 9 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Maltego Transforms to Query Traffic Records☆34Updated 9 years ago
- Phishing Toolkit☆20Updated 7 years ago
- A static website template for security pages.☆52Updated last month
- Shodan.io connector for Phantom Cyber Security Orchestration☆22Updated 8 years ago
- Maltego integration of https://abusix.com☆17Updated 6 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- apbleed☆24Updated 11 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Docker container for datasploit framework☆26Updated 8 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- ☆39Updated 6 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- ☆15Updated 5 years ago
- Truehunter☆31Updated 4 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- Twintelligence is a free Twitter OSINT tool☆52Updated 4 years ago
- This chef cookbook provides security configuration for mysql.☆27Updated last week
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Updated 11 years ago
- Search the ExploitDB with a little more control☆21Updated 8 years ago
- A very simple Python script to take screenshots of websites☆18Updated 7 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- Some good feeds for people who seriously want to keep up to date with InfoSec news and tech☆13Updated 7 years ago