KennaSecurity / toolkit
Kenna Security API and Scripting Toolkit
☆34Updated this week
Alternatives and similar repositories for toolkit:
Users that are interested in toolkit are comparing it to the libraries listed below
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆48Updated 6 months ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆27Updated last year
- Tools for AWS forensics☆64Updated 8 years ago
- Security Alert Decoration☆26Updated 2 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆63Updated this week
- ☆17Updated 3 years ago
- ☆33Updated 6 years ago
- ☆65Updated 7 months ago
- ☆10Updated 2 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 4 years ago
- ☆14Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆29Updated 2 years ago
- Visualize your Terraform files☆34Updated 4 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆109Updated 4 years ago
- A tool to monitor for potential spear phishing domains and send to Slack.☆22Updated 11 months ago
- Command line tool for working with Panther rules and policies☆38Updated this week
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆13Updated 10 months ago
- Maturity Model Collaborative project☆14Updated last year
- pocket guide for core detection engineering concepts☆27Updated last year
- ☆38Updated 8 months ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆37Updated 3 years ago
- Global Security Database Tools☆42Updated last year
- This repository provides a comprehensive collection of Pulumi scenarios utilized by cnappgoat☆19Updated last week
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- GCP CSPM using Google Sheets☆34Updated 7 months ago
- CVE.ICU code.☆37Updated this week