Risk-Assessment-Framework / Raf-Scanner
Raf Scanner IDE
☆10Updated 2 years ago
Alternatives and similar repositories for Raf-Scanner:
Users that are interested in Raf-Scanner are comparing it to the libraries listed below
- The Secure Coding Framework☆21Updated 4 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- Virtual Security Operations Center☆50Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- Maturity Model Collaborative project☆15Updated 2 years ago
- This script is to build Wazuh 4.3 environment☆12Updated 2 years ago
- A fun POC that is built to understand AI security agents.☆30Updated 3 months ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆12Updated last year
- ☆17Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Slides and materials for conference presentations☆11Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated this week
- ☆18Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- ☆14Updated last year
- Cobalt Strike/C2 Servers☆13Updated 3 years ago
- ☆20Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- An example of a mis-configured Rails application release under MIT license.☆20Updated 2 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆56Updated 2 months ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆49Updated 9 months ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- A CALDERA plugin☆26Updated 8 months ago