the complete opsec wiki 2025
by Blackjack101 - Monday December 9, 2024 at 05:53 PM
#1
Hi BreachForums comunity
--> i wish that thread will be helpful for u
Table of content :
⚠️ ☠ The DarkNetMarkets Bible {In-Browser Version} ☠ ⚠️

⚠️The Drug User's Bible {The Extended Edition} (641 Pages)⚠️

⚠️ ☘ DNM Vendors Bible {In-Browser Version} ☘⚠️

⚠️ ☯ The Hitchhiker's Guide to Online Anonymity ☯ {In-Browser Version} (with Document Outline)]⚠️

⚠️ Jolly Roger's Security Guide for Beginners⚠️

⚠️Mastering_Monero_First_Edition_by_SerHack_and_Monero_Community {In-Browser Version}⚠️

⚠️ The Tor Browser User Manual⚠️

⚠️ VeraCrypt Documentation ⚠️

⚠️How Darknet Market Users Learned to Worry More And Love PGP⚠️

⚠️Automatic User Profiling in Darknet Markets⚠️

⚠️Tails Best Practices {In-Browser Version} (by AnarSec)⚠️

⚠️ Cryptsetup is an open-source utility used to conveniently set up disk encryption based on the dm-crypt kernel module. ⚠️

⚠️ The GNU GRUB Manual (The GRand Unified Bootloader, version 2.12, 5 December 2023.)⚠️

⚠️ ♠ The GNU Privacy Guard Manual (version 2.4.4, January 2024)⚠️

⚠️♠ The Kleopatra Handbook {In-Browser Version} ♠ ⚠️

⚠️PGP User's Guide, Volume I: Essential Topics | MIT's PGP 2.6.2⚠️

⚠️PGP User's Guide, Volume II: Special Topics | MIT's PGP 2.6.2⚠️

⚠️An Advanced Introduction to GnuPG⚠️

⚠️PGP and GPG Email for the Practical Paranoid {In-Browser Version} (with Document Outline)⚠️

⚠️NGINX Cookbook⚠️

⚠️Diceware - Generate Secure Passwords You Can Actually Remember!⚠️

⚠️The Diceware Passphrase Home Page⚠️

⚠️The FreeBSD Handbook {In-Browser Version} (922 Pages)⚠️


⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏


⚐ CHECK YOURSELF ⚐

⚖ THESE TESTS ARE MEANT FOR YOUR CLEARNET BROWSER, NOT FOR Tor ⚖

(Copy and paste their links to test your CLEARNET browser and see what you are leaking.)

⚠️First, compare browsers.⚠️

⚠️Tenta - A POWERFUL browser test to test your clearnet privacy.⚠️

⚠️BrowserScan - Another very powerful and detailed browser test to test your clearnet privacy.⚠️

⚠️Device Info⚠️

⚠️BrowserLeaks⚠️

⚠️WebRTC Leak Test⚠️

⚠️CreepJS⚠️

⚠️Test Your Browser⚠️

⚠️Are you unique ?⚠️

⚠️JavaScript Browser Information⚠️

⚠️DNS Leak Test⚠️

⚠️WebRTC Leak Test⚠️

⚠️Multitude of Browser Information⚠️

⚠️DNS Leak Test - Extended Version⚠️

⚠️What Every Browser Knows About You.⚠️


NOTES:

1) WebRTC supports the streaming of audio and video content between peers. It can capture media from a user’s device (e.g., microphone or camera) and transmit it directly to another user’s device.

2) WebRTC can bypass VPNs and proxies by establishing direct connections that reveal the user's true IP address.

You can disable WebRTC in all browsers.

⚙ (Real Example) Note to end-users: Should you use Telegram software. Telegram will know that you are using (1) Virtual Box (2) the Operating System (3) the Desktop Environment, (if Linux, your GNU glibc release/version and so much more). Virtual Box will not hide you.


⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏

⚐ TOOLS ⚐


/d/GnuPG

⚠️USBKill V4.0⚠️

⚠️KeePassXC⚠️

⚠️VeraCrypt⚠️

⚠️Cryptomator⚠️

⚠️OnionShare⚠️

⚠️Nipe⚠️

⚠️The Libreboot Project⚠️

⚠️coreboot⚠️


⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏


⚐ OPERATING SYSTEMS ⚐


⚠️The Qubes OS Project⚠️

⚠️Whonix⚠️

⚠️Whonix Onion URL⚠️

⚠️Kicksecure⚠️

⚠️The Tails Project⚠️

⚠️The Debian Project⚠️

⚠️ParrotOS⚠️

⚠️Gentoo Linux⚠️

⚠️OpenBSD⚠️

⚠️The FreeBSD Project⚠️

⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏


⚐ Virtualization ⚐


⚠️QEMU⚠️

⚠️(KVM) Kernel Virtual Machine⚠️

⚠️The XEN Project⚠️

⚠️Virtual Box⚠️

⚠️VMware⚠️


⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏


⚐ ESSENTIALS ⚐


⚠️Cryptsetup and LUKS⚠️

⚠️Off-the-Record Messaging⚠️

⚠️Gajim⚠️

⚠️Privoxy⚠️

⚠️WireGuard⚠️

⚠️Mullvad Browser⚠️

⚠️ExifTool by Phil Harvey - Legendary metadata cleaner.⚠️

⚠️ExifCleaner - Cross-platform desktop GUI app to clean image metadata.⚠️

⚠️The Official Monero Wallet⚠️

⚠️Feather Wallet⚠️

⚠️DNSCrypt⚠️

⚠️dnscrypt-proxy⚠️

⚠️Ghidra⚠️

⚠️Remmina⚠️

⚠️RealVNC Viewer for Linux⚠️

⚠️GtkHash⚠️

⚠️ PurpleI2P | i2pd⚠️

⚠️John the Ripper⚠️

⚠️hashcat⚠️

⚠️Image Steganography⚠️

⚠️Wireshark⚠️

⚠️TorProxy - A Simple PHP cURL wrapper for Tor network.⚠️

⚠️torproxychains]/url]

[url=https://github.com/D4RK-4RMY/DARKARMY]DARKARMY: Hacking Tools Pack - A Penetration Testing Framework.⚠️



⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏


⚐ SECURITY ⚐


⚠️GPG messaging app for airgapped computers.⚠️

⚠️httpry⚠️

⚠️ngrep⚠️

⚠️passivedns⚠️

⚠️Sagan⚠️

⚠️Snort⚠️

⚠️SSHWATCH⚠️

⚠️SSHGuard⚠️

⚠️TCPFLOW⚠️

⚠️Stenographer⚠️

⚠️Tenzir⚠️

⚠️BorgBackup⚠️

⚠️Burp⚠️

⚠️Duplicity⚠️

⚠️rsnapshot⚠️

⚠️Cacti⚠️

⚠️Nagios⚠️

⚠️TigerVNC⚠️

⚠️Proxmox⚠️


⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏ ⚏

⚐ ADVANCED TOOLS ⚐


⚠️HiddenVM — Use any desktop OS without leaving a trace.⚠️

⚠️suicideCrypt - A toolset for creating cryptographically strong volumes that destroy themselves upon tampering.⚠️

⚠️Pi-hole is a DNS sinkhole and optionally a DHCP server, intended for use on a private network.⚠️

⚠️Torssh - A simple utility to use SSH and SCP over Tor.⚠️

⚠️TorSCP - A Tor SCP utility⚠️

⚠️Shadowsocks is a fast tunnel proxy that helps you bypass firewalls.⚠️

⚠️DeadManSwitch in rust with several triggers (remote local and network).⚠️

⚠️gokill - a software dead man's switch.⚠️

⚠️BusKill's main CLI/GUI app for arming/disarming/configuring the BusKill laptop kill cord.⚠️

⚠️Tor Router - A tool that allows you to make Tor your default gateway and send all internet connections under Tor.⚠️

⚠️Tor Relay availability checker, for using it as a bridge in countries with censorship.⚠️

⚠️Tornado - Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.⚠️

⚠️WireGuard VPN Server with an web-based admin UI + TOR⚠️

⚠️Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor network.⚠️

⚠️Torpy - Pure python Tor client implementation.⚠️

⚠️coyim - a safe and secure chat client.⚠️

⚠️tun2tor - A rust library to provide a virtual utun interface to Tor.⚠️

⚠️Tor SOCKS5 Docker Proxy⚠️

⚠️tun2socks - powered by gVisor TCP/IP stack.⚠️

⚠️Cloak - A censorship circumvention tool to evade detection by authoritarian state adversaries.⚠️

⚠️Domainim is a fast domain reconnaissance tool for organizational network scanning.⚠️

⚠️SSH-MITM - ssh audits made simple⚠️

⚠️OnionShare - Securely and anonymously share files, host websites, and chat with friends using the Tor network.⚠️

⚠️WindTerm - A Quicker and better SSH/Telnet/Serial/Shell/Sftp client for DevOps.⚠️

⚠️PIP-INTEL - OSINT and Cyber Intelligence Tool⚠️

⚠️Thief Raccoon - Login Phishing Tool⚠️

⚠️CVE Vulnerability Information Downloader⚠️

⚠️Finding vulnerabilities present in the Web Applications.⚠️

⚠️PacketSpy is a powerful network packet sniffing tool designed to capture and analyze network traffic.⚠️

⚠️UDPX is a single-packet UDP scanner.⚠️

⚠️Bryobio is a network Pcap File Analysis for SOC Analysts and CyberSecurity professionals.⚠️

⚠️Hfinger - fingerprinting malware HTTP requests.⚠️

⚠️Above is an nvisible protocol sniffer for finding vulnerabilities in a network. Designed for pentesters and security engineers.⚠️

⚠️Poastal - the Email OSINT tool.⚠️

⚠️X-Recon is a utility for identifying web page inputs and conducting XSS scanning.⚠️

⚠️Hash Calculator Online lets you generate cryptographic hash values.⚠️

⚠️Nosleep-reverseip is a mass reverse IP-lookup tool. Grab only main domains.⚠️

⚠️LockkDoor is a Framework aimed at helping penetration testers, bug bounty hunters and cyber security engineers.⚠️

⚠️StegoTorus]StegoTorus is a camouflage proxy for the Tor anonymity system. It masks the traffic from a Tor client to the entry point into the Tor onion routing such that it looks like ordinary HTML traffic.⚠️

⚠️Email Vulnerability Checker - verify whether the domain is vulnerable to spoofing by Email-vulnerablity-checker.⚠️

⚠️Ligolo-ng is an advanced, yet simple, tunneling tool that uses TUN interfaces to tunnel like a VPN.⚠️

⚠️Hashcat is the world's fastest and most advanced password recovery utility.⚠️

⚠️John the Ripper JUMBO is an advanced offline password cracker which supports CPUs and GPUs.⚠️

⚠️Angry IP Scanner is fast open-source network scanner.⚠️

⚠️Snabb: Simple and fast packet networking⚠️

⚠️tcptrack - A sniffer which displays information about TCP connections it sees on a network interface. ⚠️

⚠️Veles - Tool for binary data analysis.⚠️

⚠️Dshell is a network forensic analysis framework.⚠️

⚠️rshijack - TCP connection hijacker, Rust rewrite of shijack.⚠️

⚠️ExifTool by Phil Harvey⚠️

⚠️mat2 is a metadata removal tool.⚠️

⚠️Ants is a Networking Tool Sandbox.⚠️

⚠️Ettercap is a comprehensive suite for man in the middle attacks.⚠️

⚠️airgeddon is a multi-use bash script for Linux systems to audit wireless networks.⚠️

⚠️I2P - The Invisible Internet Project⚠️

⚠️netconan - a Network Configuration Anonymizer.⚠️

⚠️TCPTracker - tracks new connections using pcap library, detects port scans, and blocking IPv4 in IP Tables.⚠️

⚠️Pwnat is a newly developed technique, exploiting a property of NAT translation tables, with no 3rd party, port forwarding, DMZ, DNS, router admin requirements, STUN/TURN/UPnP/ICE, or spoofing.⚠️

⚠️A CLI version of Wireshark.⚠️

⚠️Iodine lets you tunnel IPv4 data through a DNS server.⚠️

⚠️xcrypt | Post-Quantum Crypto GUI for codecrypt under Linux⚠️

⚠️HevSocks5TProxy - A simple, lightweight socks5 transparent proxy for Linux. (IPv4/IPv6/TCP/UDP)⚠️

⚠️HevSocks5Tunnel - A high-performance tun2socks for Linux/Android/FreeBSD/macOS/iOS/WSL2 (IPv4/IPv6/TCP/UDP)⚠️

⚠️WGNetwork - Managing a Private Secured Network⚠️

⚠️Nftfw - Nftables firewall builder for Debian⚠️

⚠️combust is an nftables firewall script with profiles.⚠️

⚠️dnscrypt-wrapper - A server-side dnscrypt proxy. This is dnscrypt wrapper (server-side dnscrypt proxy), which helps to add dnscrypt support to any name resolver.⚠️

Enjoy : http://dreadytofatroptsdj6io7l3xptbet6on...d=16263732
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  The Ultimate OPSEC Guide for the Hyper-Vigilant Blue_Hawk 44 3,011 Yesterday, 03:40 PM
Last Post: jodjahsjdhak
  Emontions The Worst OPSEC Mistake Iceland 18 924 Yesterday, 10:32 AM
Last Post: Art10n
  The Art Of OPSEC by Zian XTN 80 6,444 08-08-2025, 01:57 PM
Last Post: jodjahsjdhak
  Basic OPSEC Tools infodump 52 2,861 08-08-2025, 01:32 PM
Last Post: n4cx
  Advanced OPSEC Persona Iceland 17 794 08-07-2025, 07:05 AM
Last Post: Masterx0x0

Forum Jump:


 Users browsing this thread: 1 Guest(s)