Extract CIS benchmarks from PDFs
☆16Jul 26, 2023Updated 2 years ago
Alternatives and similar repositories for cisextractor
Users that are interested in cisextractor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Short deep dive into Threat Hunting on AWS☆18Oct 15, 2023Updated 2 years ago
- ☆13Jul 19, 2021Updated 4 years ago
- MDM profiles for configuring various permissions and services on macOS devices using Microsoft Intune.☆27Jul 25, 2024Updated last year
- GCP Audit checks projects in Google Cloud for compliance with CIS Benchmarks☆29May 19, 2025Updated 10 months ago
- the Open Source and Pure C++ Packer for eXecutables☆21Mar 25, 2023Updated 2 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 3 months ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- ☆15Apr 15, 2021Updated 4 years ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆28Nov 30, 2025Updated 3 months ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Nov 13, 2025Updated 4 months ago
- ☆11Apr 21, 2022Updated 3 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- A script used to query the dehashed API and filter for more useful results☆16Jun 20, 2021Updated 4 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- ☆14Jul 21, 2024Updated last year
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Mar 6, 2023Updated 3 years ago
- Content Security Policy Generator, Powered by RapidSec☆16Feb 28, 2021Updated 5 years ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 9 months ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Sep 13, 2021Updated 4 years ago
- Validate proxies for specific domain☆39Aug 14, 2021Updated 4 years ago
- Summary and archive of Vatican .va (Holy See) ccTLD zone data for researchers.☆13Apr 26, 2023Updated 2 years ago
- Monitor collections of malicious Telegram bots used for phishing credential theft, to prevent frauds/dataleaks.☆17Jan 29, 2025Updated last year
- Highlights the current yank.☆12Jul 13, 2022Updated 3 years ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- A curated list of audit rules which extract from Source Code Auditing tools.☆15Feb 19, 2020Updated 6 years ago
- A purple team oriented cyber range deployed in AWS with Terraform☆12Jun 8, 2020Updated 5 years ago
- Convert switch config to yaml☆17Apr 26, 2018Updated 7 years ago
- Exploring different process injection techniques based on malware analysis☆14Dec 28, 2023Updated 2 years ago
- Various stuff and tweaks I have around Obsidian☆12Jun 20, 2025Updated 9 months ago
- ☆12Updated this week
- ll In One Tool For Info Gathering, SQL Vulnerability Scannig and Crawling☆14Jun 10, 2017Updated 8 years ago
- go client for the wazuh rest api☆12Nov 1, 2025Updated 4 months ago
- ☆13Jun 26, 2025Updated 8 months ago
- Short guide on how to connect to Termux SSH from anywhere while using TailScale as connection link.☆13Aug 30, 2021Updated 4 years ago
- An Obsidian plugin to create meeting notes from Microsoft Outlook .msg files☆15Apr 2, 2025Updated 11 months ago
- A plugin for Obsidian that allows the creation of symlinks - for Windows, OS X and Linux only!☆13Oct 31, 2024Updated last year
- CodiMD - Realtime collaborative markdown notes on all platforms.☆14Jan 7, 2025Updated last year