SSC-ICT-Innovatie / nl-kat-coordinationLinks
OpenKAT scans networks, finds vulnerabilities and creates accessible reports. It integrates the most widely used network tools and scanning software into a modular framework, accesses external databases such as shodan, and combines the information from all these sources into clear reports. It also includes lots of cat hair.
☆145Updated this week
Alternatives and similar repositories for nl-kat-coordination
Users that are interested in nl-kat-coordination are comparing it to the libraries listed below
Sorting:
- The "TaSK Framework" is a configurable test tool for performing TLS conformity tests based on the Technical Guideline TR-03116-TS.☆140Updated 2 years ago
- Internet standards compliance test suite☆203Updated last week
- Methodiek voor Informatiebeveiligingsonderzoek met Auditwaarde☆24Updated 11 months ago
- A parser for SPF and DMARC DNS records☆298Updated last week
- Sample programs to access the API☆97Updated last week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆415Updated last week
- Add a layer of active defense to your cloud applications.☆100Updated last week
- External monitoring for organization assets☆417Updated last year
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆184Updated last week
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆115Updated 3 weeks ago
- Docker image for MISP☆135Updated 2 weeks ago
- List of past and future infosec related events.☆165Updated this week
- Scan systems and docker images for potential log4j vulnerabilities. Able to patch (remove JndiLookup.class) from layered archives. Will d…☆47Updated 3 years ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆238Updated last week
- OS image for the PiRogue based on Debian 12☆161Updated last year
- 34 Policy Templates☆88Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆54Updated last month
- Generic DFIR report template☆28Updated 11 months ago
- Lacus is a capturing system using playwright, as a web service.☆95Updated this week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆256Updated last year
- ☆77Updated 3 years ago
- verinice is a tool for managing information security.☆209Updated 10 months ago
- ☆119Updated last month
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆275Updated last week
- Rulezet is an open-source web platform for sharing, evaluating, improving, and managing cybersecurity detection rules (YARA, Sigma, Suric…☆33Updated this week
- Random Cyber Threat Intelligence☆49Updated 10 months ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆93Updated last week
- Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3☆531Updated 3 years ago
- A daily updated summary of the most frequent types of security advisories currently being reported from different sources.☆257Updated last year
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆120Updated last week