This repository was created for researchers who are interested in the curation of breach data for the sake of ethical cyber security practices. The purpose for this research is to provide our clients with the most realistic assessment possible, acting as simulated threat actors utilizing the same resources and capabilities.
-
- "How I Found Your Password, and Other Advanced Data Hoarding Techiques"
-
- Guidance on storing sensitive information both at rest and during transport.
-
- Cool dorks and different query combinations to retrieve granular search results.
-
- You're looking at it 😉
-
-
This template is an example of an "official" charter document detailing the precise ethical practices which will be upheld during research based on the DoJ guidance mentioned in our presentation. Please DO NOT use this template as a "fill-in-the-blank" type form. The template is meant to be a guide to develop your own charter document to add or remove any specific practices to fit your organizational requirements.
-
Reference: https://www.justice.gov/criminal-ccips/page/file/1252341/download
-