KPN-CISO / kpn-security-policy
KPN Security Policy
☆145Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for kpn-security-policy
- Threat Feed Aggregation, Made Easy☆166Updated 4 years ago
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆136Updated last month
- Qualys community open source scripts. Please note these are provided as-is and are not supported.☆109Updated 3 months ago
- A Terraform module for GRR: the distributed incident forensics and response framework☆51Updated 4 years ago
- OpenDXL Python Client☆92Updated 3 months ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆284Updated last year
- Docker container for MISP☆96Updated 6 years ago
- Vendor Security Model Contract☆97Updated 2 years ago
- Vulnerability Compliance Report Tool used to parse Nessus files into html reports created by SynerComm, Inc.☆163Updated 5 years ago
- WebUI of MineMeld☆43Updated last year
- Prototypes for MineMeld nodes☆39Updated 3 years ago
- Engine of MineMeld☆141Updated last year
- Scripts to help work with configuration audit files☆81Updated last year
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Updated 4 years ago
- Remote Memory Acquisition Tool☆241Updated 4 years ago
- Evolving directions on building the best Open Source Forensics VM☆159Updated 6 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆76Updated 6 years ago
- Ansible playbook for installing MineMeld on Linux☆48Updated 3 years ago
- Open source security career ladders☆114Updated last year
- Repo to hold mapping of user-security-stories☆114Updated 5 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- Repository for the Open Information Security Risk Universe☆63Updated 2 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆150Updated 8 months ago
- Splunk Boss of the SOC v1 data set.☆111Updated 6 years ago
- Python installable command line utiltity for mitigation of host and key compromises.☆344Updated 3 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated last year
- ☆139Updated 5 months ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Updated 4 years ago