A Central Location For Everything You Need To Start Your Own Security Program In Your Organisation.
☆24Sep 22, 2019Updated 6 years ago
Alternatives and similar repositories for SecurityInABox
Users that are interested in SecurityInABox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Security Assessment Data Management and Analysis Tool☆38May 6, 2021Updated 4 years ago
- ☆17Mar 10, 2025Updated last year
- This solution presents a traditional 3-tier architecture in AWS.☆15May 1, 2023Updated 2 years ago
- A list of collected articles and resources from the website Peerlyst☆17Dec 14, 2016Updated 9 years ago
- ☆21Feb 22, 2023Updated 3 years ago
- Custom Teams app that uses OpenAI API and integration to PSA Tool☆14Dec 11, 2022Updated 3 years ago
- ☆25Jun 13, 2022Updated 3 years ago
- Packet communication investigator☆91Dec 8, 2022Updated 3 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆27May 22, 2019Updated 6 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆40Jul 28, 2018Updated 7 years ago
- In this workshop, you will learn techniques to implement your Disaster Recovery strategies based on AWS multi-region approach. Questions?…☆25May 21, 2024Updated last year
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 7 months ago
- DNS and Target HTTP History Local Storage and Search☆63Feb 14, 2021Updated 5 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- Check is an advanced open source browser extension by CyberDrain that provides real-time protection against Microsoft 365 phishing attack…☆108Jan 22, 2026Updated 2 months ago
- Coalfire AWS RAMP/pak Reference Architecture☆37Aug 29, 2024Updated last year
- automated penetration toolkit☆12Jul 9, 2016Updated 9 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆78Feb 23, 2020Updated 6 years ago
- CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109☆12Sep 13, 2021Updated 4 years ago
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- Automate scans using Qualys SSL Labs☆19Mar 10, 2020Updated 6 years ago
- Dark, minimalist, type-focused theme for The Lounge.☆15Nov 2, 2017Updated 8 years ago
- ☆11May 23, 2021Updated 4 years ago
- A Slack inspired theme for the Lounge IRC client☆15Sep 10, 2020Updated 5 years ago
- POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!☆12Jul 5, 2020Updated 5 years ago
- Starter app for IP Messaging with C# and ASP.NET MVC☆12Feb 28, 2017Updated 9 years ago
- AzureADRecon is a tool which gathers information about the Azure Active Directory and generates a report which can provide a holistic pic…☆211Jan 8, 2025Updated last year
- ☆14Nov 29, 2019Updated 6 years ago
- ☆12Aug 8, 2024Updated last year
- Digital Preservation Software (National Archives of Australia)☆38Jul 7, 2011Updated 14 years ago
- Best Practices☆30Dec 4, 2025Updated 3 months ago
- Tests AD passwords while respecting Bad Password Count☆18Mar 27, 2019Updated 6 years ago
- Python scripts to control and read status of Yamaha SR-C20A soundbar with web and MQTT interfaces.☆10Jan 29, 2026Updated last month
- ☆34May 30, 2023Updated 2 years ago
- Terraform playground :)☆14Aug 10, 2022Updated 3 years ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- Cura 5.x plugin for including thumbnail/preview images in gcode files for Elegoo Neptune 3 Pro, Plus and Max.☆13May 12, 2023Updated 2 years ago
- Quickly identify the ownership of hosts to identify scope during penetration tests☆13Jul 19, 2024Updated last year