Lartsch / cisextractorLinks
Extract CIS benchmarks from PDFs
☆13Updated 2 years ago
Alternatives and similar repositories for cisextractor
Users that are interested in cisextractor are comparing it to the libraries listed below
Sorting:
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last month
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- Automatic detection engineering technical state compliance☆55Updated last year
- ☆15Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- ☆80Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Short deep dive into Threat Hunting on AWS☆13Updated last year
- ☆42Updated 4 months ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- GCP Audit checks projects in Google Cloud for compliance with CIS Benchmarks☆26Updated 2 months ago
- External telegram feeder for AIL framework☆13Updated 2 weeks ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated last month
- ☆43Updated 2 years ago
- Living off the False Positive!☆37Updated 6 months ago
- Script to test NetSec capabilities.☆21Updated 2 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆33Updated last year
- This script is to build Wazuh 4.3 environment☆11Updated 3 years ago
- Virtual Security Operations Center☆51Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- ☆43Updated last month
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Windows Security Logging☆43Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆32Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago