KPN-CISO / kpn-security-policy
KPN Security Policy
☆145Updated 4 years ago
Alternatives and similar repositories for kpn-security-policy:
Users that are interested in kpn-security-policy are comparing it to the libraries listed below
- Prototypes for MineMeld nodes☆39Updated 3 years ago
- WebUI of MineMeld☆43Updated last year
- Dashboard to collect, analyze, and respond to reported phishing emails.☆285Updated last year
- Engine of MineMeld☆141Updated last year
- Threat Feed Aggregation, Made Easy☆166Updated 4 years ago
- Qualys community open source scripts. Please note these are provided as-is and are not supported.☆109Updated 6 months ago
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆139Updated 4 months ago
- Evolving directions on building the best Open Source Forensics VM☆159Updated 6 years ago
- Vendor Security Model Contract☆97Updated 2 years ago
- ☆140Updated 8 months ago
- ☆38Updated 6 years ago
- Ansible playbook for installing MineMeld on Linux☆48Updated 3 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated last year
- ☆27Updated 11 years ago
- A tool for analyzing firewall rules☆156Updated 7 years ago
- ☆48Updated 9 years ago
- Remote Memory Acquisition Tool☆245Updated 4 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆142Updated 2 years ago
- Google Cloud Platform Security Tool☆233Updated 5 years ago
- Simple block lists hub for PAN-OS DBL feature☆35Updated 6 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated last year
- Docker container for MISP☆96Updated 6 years ago
- ☆30Updated 6 years ago
- IntelMQ Manager is a graphical interface to manage configurations for IntelMQ framework.☆103Updated 6 months ago
- Scripts to help work with configuration audit files☆83Updated last year
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆90Updated 7 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Updated 4 years ago
- Automated Use Case Testing☆165Updated 6 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆227Updated 7 years ago