Risk-Assessment-Framework / Raf-Scanner
Raf Scanner IDE
☆10Updated last year
Alternatives and similar repositories for Raf-Scanner:
Users that are interested in Raf-Scanner are comparing it to the libraries listed below
- The Secure Coding Framework☆21Updated 4 years ago
- InfoSec OpenAI Examples☆19Updated last year
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- This script is to build Wazuh 4.3 environment☆12Updated 2 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- Virtual Security Operations Center☆50Updated last year
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆21Updated 7 months ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- Noob Penetration tester☆11Updated 10 months ago
- A curated list of awesome projects, libraries, and tools for MedSec.☆17Updated 6 years ago
- Bug Bounty Clipboard☆17Updated 5 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 4 years ago
- An example of a mis-configured Rails application release under MIT license.☆20Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- Slides and materials for conference presentations☆11Updated last year
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Accompanying material needed for the workshop☆11Updated last year
- ☆19Updated last year
- ☆21Updated 3 years ago
- Cobalt Strike/C2 Servers☆13Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆40Updated 2 years ago
- Maturity Model Collaborative project☆14Updated 2 years ago
- ☆17Updated last year
- ☆10Updated 4 years ago
- Hashes of infamous malware☆26Updated last year