Lartsch / cisextractorLinks
Extract CIS benchmarks from PDFs
☆16Updated 2 years ago
Alternatives and similar repositories for cisextractor
Users that are interested in cisextractor are comparing it to the libraries listed below
Sorting:
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- ☆80Updated 2 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Updated 2 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated 2 years ago
- GCP Audit checks projects in Google Cloud for compliance with CIS Benchmarks☆29Updated 8 months ago
- ☆15Updated 4 years ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆23Updated last month
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- Signature based honeypot detector tool written in Golang☆107Updated 10 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 8 months ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20Updated 8 months ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Updated 4 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆28Updated 2 years ago
- Script to test NetSec capabilities.☆21Updated 2 years ago
- SecuritySnack data that doesn't fit into a single tweet.☆43Updated last month
- Ransomware Simulator for Red/Blue teams to test their defences.☆19Updated 3 years ago
- Living off the False Positive!☆41Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last week
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆42Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Updated 4 years ago
- Project to Support The Hunter's Framework (THF)☆11Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆64Updated 3 weeks ago
- Windows Security Logging☆43Updated 3 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Updated last month
- An extension of the sigma standard to include security metrics.☆15Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated last month
- ☆42Updated 9 months ago