brennodewinter / InformatiebeveiligingsonderzoekLinks
Methodiek voor Informatiebeveiligingsonderzoek met Auditwaarde
☆24Updated 11 months ago
Alternatives and similar repositories for Informatiebeveiligingsonderzoek
Users that are interested in Informatiebeveiligingsonderzoek are comparing it to the libraries listed below
Sorting:
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆162Updated last week
- Mirror of cisa.gov/kev data files☆60Updated last week
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆53Updated last month
- quicmap is a simple yet quic (!) QUIC protocol scanner☆90Updated last year
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆40Updated last year
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆151Updated this week
- Analyze pcaps with Zeek and a Grafana Dashboard☆185Updated last year
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 3 years ago
- Code and Website For PatchThis.app☆33Updated this week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆82Updated this week
- List of past and future infosec related events.☆165Updated this week
- ☆68Updated last week
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 10 months ago
- Search a filesystem for indicators of compromise (IoC).☆81Updated this week
- VirtualGHOST Detection Tool☆97Updated last year
- Knowledge base on cybercriminal concealment techniques☆80Updated 6 months ago
- Source code and examples for Antignis☆44Updated 3 years ago
- ☆27Updated 2 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆44Updated 8 months ago
- Conference presentations☆60Updated last month
- Traps web spiders☆76Updated 5 years ago
- ☆52Updated 2 months ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆41Updated 10 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆184Updated 9 months ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- Collection of useful Canary tools☆92Updated this week
- POSIX script for mail security checks of domain names☆76Updated 2 years ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆264Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆47Updated last year
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated last month