chrissistrunk / SecurityAxioms
This is a list of Computer and Network Security Axioms
☆30Updated 4 years ago
Alternatives and similar repositories for SecurityAxioms:
Users that are interested in SecurityAxioms are comparing it to the libraries listed below
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- ☆17Updated 5 years ago
- first commit☆20Updated last year
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- ☆25Updated 8 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆79Updated 8 months ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Updated 3 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- Find potential Indicators of Compromise among similar Linux servers☆29Updated 7 years ago
- ☆53Updated 4 years ago
- Git Web Hook Tunnel for C2☆28Updated last year
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 6 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆77Updated 6 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 3 months ago
- Rapid deployment of Windows environment (files, registry keys, mutex etc) to facilitate malware analysis☆42Updated 9 years ago
- gpocheck☆30Updated 6 months ago
- BSidesCBR CTF docker compose files☆69Updated 4 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 5 years ago
- ☆17Updated 7 years ago
- Common Findings Database☆100Updated 5 years ago
- Deploy MISP Project software with Vagrant.☆43Updated 4 years ago
- Honeypot log processor to create OTX Pulse entries☆29Updated last year
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆125Updated 4 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 6 years ago
- Rapid Assessment of Web Resources☆18Updated 8 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆89Updated 10 months ago