ONYX: Cisco Automated Assessment and Auditing Tool (CAAAT). An open-source tool that automatically assesses and audits Cisco IOS routers against Center for Internet Security (CIS) Cisco IOS 15 Benchmark and Cisco IOS 17 Benchmark.
☆21May 6, 2025Updated 9 months ago
Alternatives and similar repositories for Onyx
Users that are interested in Onyx are comparing it to the libraries listed below
Sorting:
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Feb 16, 2025Updated last year
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Nov 13, 2025Updated 3 months ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Mar 31, 2023Updated 2 years ago
- ☆36Nov 26, 2024Updated last year
- Hier findet ihr alle notwendigen Informationen und Codes um meine Dashboard-Sidebar nachzubauen.☆13Aug 18, 2024Updated last year
- ☆37Nov 9, 2025Updated 3 months ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- The professional Xtreme One Framework.☆12Aug 22, 2015Updated 10 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 2 months ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- Awesome MalDev Links☆39Updated this week
- 🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse she…☆14Feb 18, 2026Updated last week
- ☆15Feb 21, 2023Updated 3 years ago
- A GPT-based chatbot who knows the content of your Confluence wiki.☆14Apr 22, 2025Updated 10 months ago
- A cookiecutter template for creating MCP (Model Control Protocol) servers☆21Feb 8, 2026Updated 3 weeks ago
- Zeek Profinet I/O Context Manager Parser - CISA ICSNPP☆13Nov 19, 2025Updated 3 months ago
- Prompts for ChatGPT 4 useful for developers, cybersecurity professionals, hackers and IT workers☆13Mar 20, 2023Updated 2 years ago
- Automatic cloud backup of Kali Linux data☆12Feb 27, 2020Updated 6 years ago
- Script for downloading Burp Suite extension files☆11Jan 29, 2024Updated 2 years ago
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- Arch Linux dotfiles☆10Oct 31, 2024Updated last year
- Repair docker-smell automatically☆13May 15, 2024Updated last year
- Simplify and speed up common tasks in your ORT-based FOSS review workflows☆13Dec 19, 2025Updated 2 months ago
- Converts JSON data to HTML table with collapsible details view for nested objects.☆14May 1, 2021Updated 4 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆12Nov 23, 2016Updated 9 years ago
- ☆15Oct 29, 2024Updated last year
- Simple Docker definition to serve mocked APIs from static JSON files.☆11Apr 27, 2018Updated 7 years ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆17Nov 18, 2025Updated 3 months ago
- ☆14Feb 8, 2020Updated 6 years ago
- Summation of the OWASP Testing Guide for reference☆10Jun 19, 2017Updated 8 years ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- Unofficial mirror of GNUK's submodule: Chopstx☆12Aug 15, 2020Updated 5 years ago
- Create CycloneDX Software Bill of Materials (SBOM) for Buildroot projects☆13Dec 9, 2025Updated 2 months ago
- ☆15Dec 4, 2023Updated 2 years ago
- Docker container escape enumeration tool.☆12Jan 23, 2021Updated 5 years ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Dec 9, 2022Updated 3 years ago
- Decentralized DNS fuzzer to mitigate ISP Snooping☆13May 3, 2017Updated 8 years ago