Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 597 Vote(s) - 3.49 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Useful Opsec Links

#1
Let’s first begin with an introduction to OPSEC,

Operations Security (OPSEC) is a critical aspect of personal and organisational security, and it's essential to be aware of the ways in which you may be leaving an online footprint. Here is a comprehensive guide on how to prevent leaving an online footprint, disappear online, and wipe all your traces.

Preventing an Online Footprint:
- Use a Virtual Private Network (VPN) to encrypt your internet connection and hide your IP address.
- Use Tor Browser to browse the internet anonymously.
- Use a password manager to generate and store strong, unique passwords for all your online accounts.
- Be mindful of the information you share online, and limit the amount of personal information you put on social media or other publicly accessible platforms.
- Use two-factor authentication (2FA) to add an extra layer of security to your online accounts.
- Clear your browser history and cookies regularly.

Disappearing Online:
- Delete your social media accounts and any other online profiles that you no longer use.
- Remove yourself from online directories, white pages, and other lists that may have your personal information.
- Reach out to websites that have your personal information and request that they delete it.
- Use a disposable email address and phone number when signing up for online accounts.
- Use a burner phone or SIM card instead of your primary phone number
.
Wiping your Traces:
- Use specialized software to wipe your hard drive, such as DBAN or CCleaner.
- Use a file shredder to permanently delete files and folders.
- Use a data destruction service to physically destroy your devices.
- Remove all SIM cards and memory cards from your devices before disposing of them.

Please note that some of the methods provided may not be legal in your jurisdiction. It is important to always comply with your local laws and regulations.

It's important to note that even with all the steps taken, there still could be traces of your online presence. Therefore, it's essential to always be mindful of the information you share online and to consider the potential consequences before sharing anything

Here are is the list with links that I find useful for people that are beginning with optimising their OPSEC:

Uncategorised:

Opsec 101:

[To see links please register here]

- covers a good amount of basic knowledge about this topic.

Open Security Training:

[To see links please register here]

- This site provides free online courses on a variety of cybersecurity topics, including OPSEC.

HaveIBeenPowned:

[To see links please register here]

- Have I Been Pwned allows you to search across multiple data breaches to see if your email address or phone number has been compromised.

TailsOS:

[To see links please register here]

-
TailsOS is a free, open-source, privacy-focused operating system that can be run on any computer from a USB drive or DVD. It routes all internet connections through the Tor network, and automatically deletes all data when shut down.

The Center for Internet Security (CIS) Control:

[To see links please register here]

- CIS provides a set of 20 critical security controls that organizations can use to improve their cybersecurity posture, including controls related to OPSEC.

Donkey Defender:

[To see links please register here]

- A cross-browser extension designed to resist phishing attacks by blocking fake links such as amaz0n.com

Backroundchecks.org:

[To see links please register here]

- A directory of direct links to delete your account from web services.

Billdietrich:

[To see links please register here]

- Very good beginner tips

PrivacyTools:

[To see links please register here]

- Lots of tools

The Privacy Rights Clearinghouse:

[To see links please register here]

- This organization provides a variety of resources and guides on protecting your personal information and privacy online, including guides on OPSEC.

Tor Project:

[To see links please register here]

- Tor is a free and open-source software that enables anonymous communication. It is a powerful tool for protecting your online privacy.


Messaging:

Signal:

[To see links please register here]

- Signal is a free and open-source end-to-end encryption messaging application, it's an excellent tool for secure communication.

Matrix:

[To see links please register here]

- a free and open-source decentralized communication platform that uses end-to-end encryption for secure messaging and peer-to-peer communication, providing additional layers of security and privacy.

WickR:

[To see links please register here]

- Wickr is a single end-to-end encrypted service that provides a full suite of collaboration capabilities on any device. (Used for governmental communication before)


Password management:

Keepass:

[To see links please register here]

- KeePass is a free, open-source password manager that can generate and store strong, unique passwords for all your online accounts.

Bitwarden:

[To see links please register here]

- Bitwarden is an open-source password manager that securely stores your passwords and personal information. It is available for free and also has a paid version with additional features.

Myki

[To see links please register here]

- Myki is a password manager that securely stores your passwords and personal information. It is available as a free version and a paid version with additional features.

KeePassXC:

[To see links please register here]

- is a secure open-source password manager for Linux. It is a community-driven fork of the popular KeePass password manager and offers a wide range of features such as password generation, password database encryption, and a built-in password manager.


Disk Encryption:

TrueCrypt:

[To see links please register here]

- TrueCrypt is a free and open-source disk encryption software that can encrypt your entire hard drive or a removable storage device, such as a USB flash drive.

GuardianProject:

[To see links please register here]

- Disk Encryption for Linux

Veracrypt:

[To see links please register here]

- Encryption for Windows


VPN’s and Proxies:

OpenVPN:

[To see links please register here]

- OpenVPN is a free and open-source software that enables you to create a secure, encrypted connection to another network over the internet. It can be used to encrypt your internet connection and improve your online privacy.

ProtonVPN:

[To see links please register here]

- ProtonVPN offers a free version of its VPN service with unlimited data usage, although it has some limitations compared to the paid version.

TunnelBear:

[To see links please register here]

- TunnelBear offers a free version of its VPN service with a data usage limit of 500MB per month.
Windscribe:

[To see links please register here]

- Windscribe offers a free version of its VPN service with a data usage limit of 10GB per month.

Hotspot Shield:

[To see links please register here]

- Hotspot Shield offers a free version of its VPN service with a data usage limit of 500MB per day.

Hide.me:

[To see links please register here]

- Hide.me offers a free version of its VPN service with a data usage limit of 2GB per month.

HideMyAss:

[To see links please register here]

- HideMyAss offers a free proxy service that allows you to browse the internet anonymously and access blocked websites.

KProxy:

[To see links please register here]

- KProxy offers a free proxy service that allows you to browse the internet anonymously and access blocked websites.

FilterBypass:

[To see links please register here]

- FilterBypass offers a free proxy service that allows you to browse the internet anonymously and access blocked websites.


Please note that while these resources can provide a free VPN or proxy service, they should not be considered an exhaustive list. Additionally, some of the free VPNs have limitations and might not be as secure as a paid VPN and their privacy policy should be read carefully. It is essential to do your own research and to consider the specific needs of your organization or personal situation when selecting a VPN or proxy service.

Interesting Articles:

6 OPSEC don’ts:

[To see links please register here]


Similar OPSEC guide as mine:

OPERATIONS SECURITY (OPSEC)
EDITION SEPTEMBER 2017:


Please leave a reply with useful links, the bigger the list the better we improve the thread!
Reply

#2
Will add new links as soon as I think it’s necessary!


New links added, and started with the first colours to make it easier to distinguish different categories
Reply

#3
Moved from the Design Tutorials forum to Hacking Tutorials.

A brilliant guide Indeed.
Reply

#4
Thank you very much for the compliment!

Quote:(01-22-2023, 11:48 AM)mothered Wrote:

[To see links please register here]

Moved from the Design Tutorials forum to Hacking Tutorials.

A brilliant guide Indeed.
Reply

#5
Quote:(01-22-2023, 01:36 PM)CMCS2553 Wrote:

[To see links please register here]

Thank you very much for the compliment!
You're welcome.

Thanks for the HQ guide.
Reply

#6
Made a messaging section, will try to make this a bigger thread in the future!

PS: I’m making this just for fun but also because I realised, a lot of people don’t realise how important OPSEC is.. don’t forget that your own bad OPSEC skills, could fuck up someone else.
Reply

#7
Fresh new links added!

Quote:(01-21-2023, 09:09 AM)CMCS2553 Wrote:

[To see links please register here]

Let’s first begin with an introduction to OPSEC,

Operations Security (OPSEC) is a critical aspect of personal and organisational security, and it's essential to be aware of the ways in which you may be leaving an online footprint. Here is a comprehensive guide on how to prevent leaving an online footprint, disappear online, and wipe all your traces.

Preventing an Online Footprint:
- Use a Virtual Private Network (VPN) to encrypt your internet connection and hide your IP address.
- Use Tor Browser to browse the internet anonymously.
- Use a password manager to generate and store strong, unique passwords for all your online accounts.
- Be mindful of the information you share online, and limit the amount of personal information you put on social media or other publicly accessible platforms.
- Use two-factor authentication (2FA) to add an extra layer of security to your online accounts.
- Clear your browser history and cookies regularly.

Disappearing Online:
- Delete your social media accounts and any other online profiles that you no longer use.
- Remove yourself from online directories, white pages, and other lists that may have your personal information.
- Reach out to websites that have your personal information and request that they delete it.
- Use a disposable email address and phone number when signing up for online accounts.
- Use a burner phone or SIM card instead of your primary phone number
.
Wiping your Traces:
- Use specialized software to wipe your hard drive, such as DBAN or CCleaner.
- Use a file shredder to permanently delete files and folders.
- Use a data destruction service to physically destroy your devices.
- Remove all SIM cards and memory cards from your devices before disposing of them.

Please note that some of the methods provided may not be legal in your jurisdiction. It is important to always comply with your local laws and regulations.

It's important to note that even with all the steps taken, there still could be traces of your online presence. Therefore, it's essential to always be mindful of the information you share online and to consider the potential consequences before sharing anything

Here are the links that I find useful for people that are beginning with specialising their OPSEC:

Opsec 101:

[To see links please register here]

- covers a good amount of basic knowledge about this topic.

Open Security Training:

[To see links please register here]

- This site provides free online courses on a variety of cybersecurity topics, including OPSEC.

TailsOS:

[To see links please register here]

-
TailsOS is a free, open-source, privacy-focused operating system that can be run on any computer from a USB drive or DVD. It routes all internet connections through the Tor network, and automatically deletes all data when shut down.

The Center for Internet Security (CIS) Control:

[To see links please register here]

- CIS provides a set of 20 critical security controls that organizations can use to improve their cybersecurity posture, including controls related to OPSEC.

Donkey Defender:

[To see links please register here]

- A cross-browser extension designed to resist phishing attacks by blocking fake links such as amaz0n.com

Backroundchecks.org:

[To see links please register here]

- A directory of direct links to delete your account from web services.

Billdietrich:

[To see links please register here]

- Very good beginner tips

PrivacyTools:

[To see links please register here]

- Lots of tools

The Privacy Rights Clearinghouse:

[To see links please register here]

- This organization provides a variety of resources and guides on protecting your personal information and privacy online, including guides on OPSEC.

Tor Project:

[To see links please register here]

- Tor is a free and open-source software that enables anonymous communication. It is a powerful tool for protecting your online privacy.

Messaging:

Signal:

[To see links please register here]

- Signal is a free and open-source end-to-end encryption messaging application, it's an excellent tool for secure communication.

Matrix:

[To see links please register here]

- a free and open-source decentralized communication platform that uses end-to-end encryption for secure messaging and peer-to-peer communication, providing additional layers of security and privacy.

WickR:

[To see links please register here]

- Wickr is a single end-to-end encrypted service that provides a full suite of collaboration capabilities on any device. (Used for governmental communication before)


Password management:

Keepass:

[To see links please register here]

- KeePass is a free, open-source password manager that can generate and store strong, unique passwords for all your online accounts.

Bitwarden:

[To see links please register here]

- Bitwarden is an open-source password manager that securely stores your passwords and personal information. It is available for free and also has a paid version with additional features.

Myki

[To see links please register here]

- Myki is a password manager that securely stores your passwords and personal information. It is available as a free version and a paid version with additional features.

KeePassXC:

[To see links please register here]

- is a secure open-source password manager for Linux. It is a community-driven fork of the popular KeePass password manager and offers a wide range of features such as password generation, password database encryption, and a built-in password manager.


Disk Encryption:

TrueCrypt:

[To see links please register here]

- TrueCrypt is a free and open-source disk encryption software that can encrypt your entire hard drive or a removable storage device, such as a USB flash drive.

GuardianProject:

[To see links please register here]

- Disk Encryption for Linux

Veracrypt:

[To see links please register here]

- Encryption for Windows


VPN’s and Proxies:

OpenVPN:

[To see links please register here]

- OpenVPN is a free and open-source software that enables you to create a secure, encrypted connection to another network over the internet. It can be used to encrypt your internet connection and improve your online privacy.

ProtonVPN:

[To see links please register here]

- ProtonVPN offers a free version of its VPN service with unlimited data usage, although it has some limitations compared to the paid version.

TunnelBear:

[To see links please register here]

- TunnelBear offers a free version of its VPN service with a data usage limit of 500MB per month.
Windscribe:

[To see links please register here]

- Windscribe offers a free version of its VPN service with a data usage limit of 10GB per month.

Hotspot Shield:

[To see links please register here]

- Hotspot Shield offers a free version of its VPN service with a data usage limit of 500MB per day.

Hide.me:

[To see links please register here]

- Hide.me offers a free version of its VPN service with a data usage limit of 2GB per month.

HideMyAss:

[To see links please register here]

- HideMyAss offers a free proxy service that allows you to browse the internet anonymously and access blocked websites.

KProxy:

[To see links please register here]

- KProxy offers a free proxy service that allows you to browse the internet anonymously and access blocked websites.

FilterBypass:

[To see links please register here]

- FilterBypass offers a free proxy service that allows you to browse the internet anonymously and access blocked websites.


Please note that while these resources can provide a free VPN or proxy service, they should not be considered an exhaustive list. Additionally, some of the free VPNs have limitations and might not be as secure as a paid VPN and their privacy policy should be read carefully. It is essential to do your own research and to consider the specific needs of your organization or personal situation when selecting a VPN or proxy service.

Interesting Articles:

6 OPSEC don’ts:

[To see links please register here]


OPERATIONS SECURITY (OPSEC)
EDITION SEPTEMBER 2017:


Please leave a reply with useful links, the bigger the list the better we improve the thread!
Reply

#8
New links added!

Quote:(01-21-2023, 09:09 AM)CMCS2553 Wrote:

[To see links please register here]

Let’s first begin with an introduction to OPSEC,

Operations Security (OPSEC) is a critical aspect of personal and organisational security, and it's essential to be aware of the ways in which you may be leaving an online footprint. Here is a comprehensive guide on how to prevent leaving an online footprint, disappear online, and wipe all your traces.

Preventing an Online Footprint:
- Use a Virtual Private Network (VPN) to encrypt your internet connection and hide your IP address.
- Use Tor Browser to browse the internet anonymously.
- Use a password manager to generate and store strong, unique passwords for all your online accounts.
- Be mindful of the information you share online, and limit the amount of personal information you put on social media or other publicly accessible platforms.
- Use two-factor authentication (2FA) to add an extra layer of security to your online accounts.
- Clear your browser history and cookies regularly.

Disappearing Online:
- Delete your social media accounts and any other online profiles that you no longer use.
- Remove yourself from online directories, white pages, and other lists that may have your personal information.
- Reach out to websites that have your personal information and request that they delete it.
- Use a disposable email address and phone number when signing up for online accounts.
- Use a burner phone or SIM card instead of your primary phone number
.
Wiping your Traces:
- Use specialized software to wipe your hard drive, such as DBAN or CCleaner.
- Use a file shredder to permanently delete files and folders.
- Use a data destruction service to physically destroy your devices.
- Remove all SIM cards and memory cards from your devices before disposing of them.

Please note that some of the methods provided may not be legal in your jurisdiction. It is important to always comply with your local laws and regulations.

It's important to note that even with all the steps taken, there still could be traces of your online presence. Therefore, it's essential to always be mindful of the information you share online and to consider the potential consequences before sharing anything

Here are the links that I find useful for people that are beginning with specialising their OPSEC:

Opsec 101:

[To see links please register here]

- covers a good amount of basic knowledge about this topic.

Open Security Training:

[To see links please register here]

- This site provides free online courses on a variety of cybersecurity topics, including OPSEC.

HaveIBeenPowned:

[To see links please register here]

- Have I Been Pwned allows you to search across multiple data breaches to see if your email address or phone number has been compromised.

TailsOS:

[To see links please register here]

-
TailsOS is a free, open-source, privacy-focused operating system that can be run on any computer from a USB drive or DVD. It routes all internet connections through the Tor network, and automatically deletes all data when shut down.

The Center for Internet Security (CIS) Control:

[To see links please register here]

- CIS provides a set of 20 critical security controls that organizations can use to improve their cybersecurity posture, including controls related to OPSEC.

Donkey Defender:

[To see links please register here]

- A cross-browser extension designed to resist phishing attacks by blocking fake links such as amaz0n.com

Backroundchecks.org:

[To see links please register here]

- A directory of direct links to delete your account from web services.

Billdietrich:

[To see links please register here]

- Very good beginner tips

PrivacyTools:

[To see links please register here]

- Lots of tools

The Privacy Rights Clearinghouse:

[To see links please register here]

- This organization provides a variety of resources and guides on protecting your personal information and privacy online, including guides on OPSEC.

Tor Project:

[To see links please register here]

- Tor is a free and open-source software that enables anonymous communication. It is a powerful tool for protecting your online privacy.

Messaging:

Signal:

[To see links please register here]

- Signal is a free and open-source end-to-end encryption messaging application, it's an excellent tool for secure communication.

Matrix:

[To see links please register here]

- a free and open-source decentralized communication platform that uses end-to-end encryption for secure messaging and peer-to-peer communication, providing additional layers of security and privacy.

WickR:

[To see links please register here]

- Wickr is a single end-to-end encrypted service that provides a full suite of collaboration capabilities on any device. (Used for governmental communication before)


Password management:

Keepass:

[To see links please register here]

- KeePass is a free, open-source password manager that can generate and store strong, unique passwords for all your online accounts.

Bitwarden:

[To see links please register here]

- Bitwarden is an open-source password manager that securely stores your passwords and personal information. It is available for free and also has a paid version with additional features.

Myki

[To see links please register here]

- Myki is a password manager that securely stores your passwords and personal information. It is available as a free version and a paid version with additional features.

KeePassXC:

[To see links please register here]

- is a secure open-source password manager for Linux. It is a community-driven fork of the popular KeePass password manager and offers a wide range of features such as password generation, password database encryption, and a built-in password manager.


Disk Encryption:

TrueCrypt:

[To see links please register here]

- TrueCrypt is a free and open-source disk encryption software that can encrypt your entire hard drive or a removable storage device, such as a USB flash drive.

GuardianProject:

[To see links please register here]

- Disk Encryption for Linux

Veracrypt:

[To see links please register here]

- Encryption for Windows


VPN’s and Proxies:

OpenVPN:

[To see links please register here]

- OpenVPN is a free and open-source software that enables you to create a secure, encrypted connection to another network over the internet. It can be used to encrypt your internet connection and improve your online privacy.

ProtonVPN:

[To see links please register here]

- ProtonVPN offers a free version of its VPN service with unlimited data usage, although it has some limitations compared to the paid version.

TunnelBear:

[To see links please register here]

- TunnelBear offers a free version of its VPN service with a data usage limit of 500MB per month.
Windscribe:

[To see links please register here]

- Windscribe offers a free version of its VPN service with a data usage limit of 10GB per month.

Hotspot Shield:

[To see links please register here]

- Hotspot Shield offers a free version of its VPN service with a data usage limit of 500MB per day.

Hide.me:

[To see links please register here]

- Hide.me offers a free version of its VPN service with a data usage limit of 2GB per month.

HideMyAss:

[To see links please register here]

- HideMyAss offers a free proxy service that allows you to browse the internet anonymously and access blocked websites.

KProxy:

[To see links please register here]

- KProxy offers a free proxy service that allows you to browse the internet anonymously and access blocked websites.

FilterBypass:

[To see links please register here]

- FilterBypass offers a free proxy service that allows you to browse the internet anonymously and access blocked websites.


Please note that while these resources can provide a free VPN or proxy service, they should not be considered an exhaustive list. Additionally, some of the free VPNs have limitations and might not be as secure as a paid VPN and their privacy policy should be read carefully. It is essential to do your own research and to consider the specific needs of your organization or personal situation when selecting a VPN or proxy service.

Interesting Articles:

6 OPSEC don’ts:

[To see links please register here]


Similar OPSEC guide as mine:

OPERATIONS SECURITY (OPSEC)
EDITION SEPTEMBER 2017:


Please leave a reply with useful links, the bigger the list the better we improve the thread!
Reply

#9
Very nice list, gonna spend one of my next weekend going through it!
Reply

#10
Thank you for the links, very useful. I personally like open source Whonix OS with Virtualbox. Takes just a few minutes to install and provides a secure Tor-enabled Linux OS with an emphasis on maximum protection and anonymity. I also like Mullvad vpn configured with their socks5 proxy (tutorial on mullvad's site) to increase security and reduce the number of captchas.
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through