Methodiek voor Informatiebeveiligingsonderzoek met Auditwaarde
☆26Dec 19, 2024Updated last year
Alternatives and similar repositories for Informatiebeveiligingsonderzoek
Users that are interested in Informatiebeveiligingsonderzoek are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- security.txt parser and validator☆23Dec 11, 2025Updated 4 months ago
- EduRansW (Vulnransomware) An safe-to-use vulnerable ransomware designed to learn about reversing and exploitation of basic ransomware vri…☆15May 22, 2025Updated 11 months ago
- An API for launching/configuring/and maintaining services in the clouds☆17Apr 15, 2015Updated 11 years ago
- Source code for the (new) WOO platform used by the Ministry of Health, Welfare and Sport☆11Mar 30, 2026Updated last month
- Script and stuff for use in my blogposts☆18Feb 19, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Nagios/Icinga plugin for checking DANE/TLSA records☆13Apr 18, 2021Updated 5 years ago
- Choices choices, which is the one?☆14Nov 22, 2024Updated last year
- Passkeys/FIDO2/WebAuthn .NET Library for Windows Desktop and CLI Applications☆42Updated this week
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆65Mar 30, 2026Updated last month
- ☆12Oct 24, 2022Updated 3 years ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- SPIN Core Software☆79Feb 16, 2022Updated 4 years ago
- Powershell Script to enumerate AzureAD and output good data☆14Nov 8, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- AI/ML made easy☆10Feb 10, 2020Updated 6 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆17Sep 9, 2022Updated 3 years ago
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆76Feb 9, 2024Updated 2 years ago
- ☆18Jan 9, 2026Updated 4 months ago
- Python utils library and tools (verify-scts, ctloglist, ...) for Certificate Transparency.☆35Feb 7, 2023Updated 3 years ago
- Generates Wireguard configuration files☆15Jul 26, 2022Updated 3 years ago
- Repo for proof of concept exploits and tools.☆56Oct 15, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Browser Bookmark that will ask for keyword(s) and then color highlight these words on the webpage you visit☆12Nov 15, 2023Updated 2 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Solution to deploy a Sentinel playground demo environment☆58Jun 9, 2023Updated 2 years ago
- Programmable browser for functional black-box tests☆21Dec 8, 2025Updated 5 months ago
- not-so-private-relay☆15Feb 21, 2025Updated last year
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- a repo for utilizing a base64 like encoding scheme + AES Encryption using Emojis☆13Mar 16, 2025Updated last year
- a portable C library for SPDY transport (DEAD project!)☆87Jul 15, 2012Updated 13 years ago
- Overview of existing mappings from and to cyber security controls☆19Oct 30, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A simple linter for Sigma rules☆13Oct 22, 2020Updated 5 years ago
- Rebuild of portspoof in GO with additional features.☆30Apr 7, 2026Updated last month
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- Presentations from Conferences☆31Sep 14, 2024Updated last year
- Simple host-based permit-by-exception iptables generation script☆16Sep 5, 2020Updated 5 years ago
- Think of this PS-module as a helper for Microsoft Graph version-management, connectivity and data management using Microsoft Graph.☆15Apr 28, 2025Updated last year
- Automated av content transcription search for your website☆15Mar 5, 2026Updated 2 months ago