brennodewinter / InformatiebeveiligingsonderzoekLinks
Methodiek voor Informatiebeveiligingsonderzoek met Auditwaarde
☆21Updated 7 months ago
Alternatives and similar repositories for Informatiebeveiligingsonderzoek
Users that are interested in Informatiebeveiligingsonderzoek are comparing it to the libraries listed below
Sorting:
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated this week
- The Invoke-TrimarcADChecks.ps1 PowerShell script is designed to gather data from a single domain AD forest based on our similar checks pe…☆55Updated 2 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 2 years ago
- ☆66Updated 4 years ago
- ☆21Updated 2 years ago
- SANS Holiday Hack Challenge write-up template☆16Updated last year
- ☆77Updated 2 years ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆114Updated last year
- POSIX script for mail security checks of domain names☆76Updated 2 years ago
- Collection of useful Canary tools☆84Updated last month
- This is a collection of Security Baselines that I use in my virtual lab environment.☆21Updated 5 years ago
- ☆173Updated this week
- Automatically exported from code.google.com/p/nipper-ng☆70Updated 3 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated last year
- Passive OS detection based on SYN packets without Transmitting any Data☆47Updated 2 years ago
- Statically Compiled Tools that could be used in engagements☆17Updated 2 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆103Updated last month
- Builds a hashmap of AD NTLM hashes/usernames and iterates through a second list of hashes checking for the existence of each entry in the…☆77Updated 5 years ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 9 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 5 years ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆103Updated last week
- Find and notify users in your Active Directory with weak passwords☆101Updated 3 years ago
- ☆83Updated 3 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆35Updated last year
- OpenKAT scans networks, finds vulnerabilities and creates accessible reports. It integrates the most widely used network tools and scanni…☆141Updated this week
- Mirror of cisa.gov/kev data files☆53Updated this week
- ASR Configurator, Essentials and Atomic Testing☆84Updated 3 months ago