brennodewinter / InformatiebeveiligingsonderzoekLinks
Methodiek voor Informatiebeveiligingsonderzoek met Auditwaarde
☆23Updated 9 months ago
Alternatives and similar repositories for Informatiebeveiligingsonderzoek
Users that are interested in Informatiebeveiligingsonderzoek are comparing it to the libraries listed below
Sorting:
- Mirror of cisa.gov/kev data files☆56Updated last week
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated last week
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆38Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆78Updated 3 weeks ago
- ☆49Updated 3 weeks ago
- POSIX script for mail security checks of domain names☆76Updated 2 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 8 months ago
- ☆67Updated 4 years ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 2 years ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 8 months ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆117Updated 3 weeks ago
- Source code and examples for Antignis☆43Updated 2 years ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 10 months ago
- ☆180Updated 2 weeks ago
- ☆83Updated 3 years ago
- The Invoke-TrimarcADChecks.ps1 PowerShell script is designed to gather data from a single domain AD forest based on our similar checks pe…☆55Updated 2 years ago
- ☆26Updated 2 years ago
- Traps web spiders☆75Updated 5 years ago
- Collection of useful Canary tools☆88Updated last month
- Awesome Incident Response☆280Updated last month
- VirtualGHOST Detection Tool☆92Updated last year
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated 2 years ago
- Extracting IoC data from eMail☆138Updated last month
- Conference presentations☆59Updated 2 weeks ago
- OpenKAT scans networks, finds vulnerabilities and creates accessible reports. It integrates the most widely used network tools and scanni…☆141Updated this week
- Knowledge base on cybercriminal concealment techniques☆76Updated 4 months ago
- Unleash the power of the Falcon Platform at the CLI☆123Updated 2 weeks ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆255Updated last year
- Canary Detection☆187Updated 4 months ago