ONYX: Cisco Automated Assessment and Auditing Tool (CAAAT). An open-source tool that automatically assesses and audits Cisco IOS routers against Center for Internet Security (CIS) Cisco IOS 15 Benchmark and Cisco IOS 17 Benchmark.
☆21May 6, 2025Updated 10 months ago
Alternatives and similar repositories for Onyx
Users that are interested in Onyx are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Feb 16, 2025Updated last year
- ☆14Feb 8, 2020Updated 6 years ago
- The professional Xtreme One Framework.☆12Aug 22, 2015Updated 10 years ago
- ☆15May 3, 2024Updated last year
- Hier findet ihr alle notwendigen Informationen und Codes um meine Dashboard-Sidebar nachzubauen.☆13Aug 18, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Jan 14, 2025Updated last year
- An SSH honeypot written entirely in Go.☆13Dec 4, 2025Updated 3 months ago
- Tools for Open-WebUI☆24May 14, 2025Updated 10 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆16Sep 9, 2022Updated 3 years ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- A curated list of awesome projects, libraries, and tools for MedSec.☆19Mar 22, 2019Updated 7 years ago
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- Server-side video workflows for agents: ingest, understand, search, edit, stream.☆49Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Nov 13, 2025Updated 4 months ago
- ☆17Sep 2, 2020Updated 5 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Mar 11, 2026Updated 2 weeks ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆31Nov 4, 2024Updated last year
- suricata rules☆18Dec 26, 2024Updated last year
- The Auditd Framework logs and applies security policy to linux auditd data☆15Jan 26, 2018Updated 8 years ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- Vollautomatisches, einfaches Linux mit Webbrowser für Kiosks oder sehr leichte Workstations☆11Mar 19, 2026Updated last week
- This is the Code of my HA-Dashboard☆11Mar 19, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This repo is automatically updated daily with the latest available apps from the Enterprise App Catalog in Microsoft Intune☆22Jul 27, 2025Updated 7 months ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Playbooks designed for IBM SOAR developed by The IR Gurus. These playbooks can be used to demonstrate how to design playbooks, perform au…☆18May 1, 2024Updated last year
- Coma is a lightweight command-line tool designed for crawling websites☆28Feb 2, 2025Updated last year
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Jul 16, 2025Updated 8 months ago
- Generate a matrix based on an inventory of InfoSec tools☆24Jul 4, 2024Updated last year
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆13Nov 23, 2016Updated 9 years ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- We want to create a dashboard (with knowledge graphs) to visualize the network node communication situation based on the firewall logs to…☆16Oct 26, 2024Updated last year
- Ruby gem to check to see if an email address is on http://haveibeenpwned.com☆17Oct 26, 2017Updated 8 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Feb 6, 2023Updated 3 years ago
- A cookiecutter template for creating MCP (Model Control Protocol) servers☆21Feb 8, 2026Updated last month
- Docker container escape enumeration tool.☆12Jan 23, 2021Updated 5 years ago
- Tools for Quickly Formatting and Partitioning USB Flash Drives☆11Apr 13, 2016Updated 9 years ago