brennodewinter / InformatiebeveiligingsonderzoekLinks
Methodiek voor Informatiebeveiligingsonderzoek met Auditwaarde
☆23Updated 10 months ago
Alternatives and similar repositories for Informatiebeveiligingsonderzoek
Users that are interested in Informatiebeveiligingsonderzoek are comparing it to the libraries listed below
Sorting:
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated 2 weeks ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated 3 weeks ago
- Collection of useful Canary tools☆92Updated 2 weeks ago
- Traps web spiders☆76Updated 5 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆52Updated last week
- Mirror of cisa.gov/kev data files☆60Updated last week
- POSIX script for mail security checks of domain names☆76Updated 2 years ago
- ☆67Updated 4 years ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated last year
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year
- Source code and examples for Antignis☆43Updated 3 years ago
- ☆62Updated last week
- DShield Sensor Log Collection with ELK☆42Updated last month
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated 2 years ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆79Updated 2 months ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- InsightVM helpful SQL queries☆73Updated 8 months ago
- ☆190Updated 2 weeks ago
- Unleash the power of the Falcon Platform at the CLI☆131Updated 3 weeks ago
- Awesome Incident Response☆283Updated last month
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 3 years ago
- Signature based honeypot detector tool written in Golang☆105Updated 7 months ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆151Updated last week
- Conference presentations☆60Updated last week
- Analyze pcaps with Zeek and a Grafana Dashboard☆186Updated last year
- Tools and scripts by Arctic Wolf☆69Updated 3 months ago
- Knowledge base on cybercriminal concealment techniques☆78Updated 5 months ago
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆40Updated last year
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆255Updated 11 months ago
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆58Updated 5 months ago