89berner / waf-api-talkLinks
☆20Updated last year
Alternatives and similar repositories for waf-api-talk
Users that are interested in waf-api-talk are comparing it to the libraries listed below
Sorting:
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 5 years ago
- Simple S3 Bucket Testing Software☆31Updated 4 years ago
- Serverless honeytoken 🕵🏻♂️☆81Updated 3 years ago
- A forensic evidence acquirer☆86Updated 4 years ago
- Manticore Adversary Emulation Cli☆47Updated 5 years ago
- A canary designed to minimize the impact from certain Ransomware actors☆102Updated 4 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 4 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 3 years ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆112Updated 4 years ago
- Tools for auditing WAFS☆19Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 6 years ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 8 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆94Updated 2 years ago
- Merge all Yara rules from official Yara github repository in one .yar file☆31Updated 7 years ago
- DNS server limitation mapper☆26Updated 7 years ago
- A CVE Heatmap Using CalPlot☆97Updated 5 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- An easy to grep dump of the NVD database showing only; CVE-ID, CVSS Risk Score, and Summary.☆56Updated 3 years ago
- Scout - a Contactless Active Reconnaissance Tool☆56Updated 3 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated 7 months ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Updated 3 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago