ONYX: Cisco Automated Assessment and Auditing Tool (CAAAT). An open-source tool that automatically assesses and audits Cisco IOS routers against Center for Internet Security (CIS) Cisco IOS 15 Benchmark and Cisco IOS 17 Benchmark.
☆21May 6, 2025Updated 11 months ago
Alternatives and similar repositories for Onyx
Users that are interested in Onyx are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Meeps Security is a gamified cybersecurity training and awareness framework. In the game, players handle incoming calls about cybersecuri…☆34Aug 29, 2025Updated 8 months ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆18Apr 1, 2026Updated last month
- Various PowerShell scripts that may be useful during red team exercise☆21Apr 28, 2022Updated 4 years ago
- ☆15Oct 29, 2024Updated last year
- ☆16May 3, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Folder Or File Delete to Get System Shell on Current Session Desktop☆46Jan 14, 2025Updated last year
- An SSH honeypot written entirely in Go.☆14Dec 4, 2025Updated 5 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆16Sep 9, 2022Updated 3 years ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆36Nov 13, 2025Updated 5 months ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆20Apr 22, 2026Updated last week
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆31Nov 4, 2024Updated last year
- suricata rules☆18Dec 26, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The Auditd Framework logs and applies security policy to linux auditd data☆15Jan 26, 2018Updated 8 years ago
- ☆66Sep 1, 2023Updated 2 years ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- This is the Code of my HA-Dashboard☆11Mar 19, 2024Updated 2 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago
- Handy scripts developed and discussed on http://auditcasts.com☆19Aug 19, 2019Updated 6 years ago
- ☆53Apr 19, 2023Updated 3 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This repo is automatically updated daily with the latest available apps from the Enterprise App Catalog in Microsoft Intune☆22Jul 27, 2025Updated 9 months ago
- The FASTEST way to parse Email☆18Dec 24, 2021Updated 4 years ago
- Coma is a lightweight command-line tool designed for crawling websites☆28Feb 2, 2025Updated last year
- Unofficial mirror of GNUK's submodule: Chopstx☆12Aug 15, 2020Updated 5 years ago
- Adaptive Machine Learning-Based Stock Prediction using Financial Time Series Technical Indicators☆10Dec 21, 2019Updated 6 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Apr 2, 2026Updated last month
- Generate a matrix based on an inventory of InfoSec tools☆24Jul 4, 2024Updated last year
- We want to create a dashboard (with knowledge graphs) to visualize the network node communication situation based on the firewall logs to…☆16Oct 26, 2024Updated last year
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆13Nov 23, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ruby gem to check to see if an email address is on http://haveibeenpwned.com☆17Oct 26, 2017Updated 8 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆35Apr 13, 2026Updated 3 weeks ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Feb 6, 2023Updated 3 years ago
- A cookiecutter template for creating MCP (Model Control Protocol) servers☆21Apr 7, 2026Updated 3 weeks ago
- Graphical user interface for dnscrypt-proxy☆21Dec 28, 2025Updated 4 months ago
- Tools for Quickly Formatting and Partitioning USB Flash Drives☆11Apr 13, 2016Updated 10 years ago
- Docker configuration for running Pi-Hole and Cloudflared on a Raspberry Pi for ultimate network DNS filtering and security☆11Jul 17, 2021Updated 4 years ago