chrissistrunk / SecurityAxiomsLinks
This is a list of Computer and Network Security Axioms
☆30Updated 5 years ago
Alternatives and similar repositories for SecurityAxioms
Users that are interested in SecurityAxioms are comparing it to the libraries listed below
Sorting:
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Updated 9 years ago
- Repo for MIRR Workshop Heroku app☆52Updated 5 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆79Updated 7 years ago
- first commit☆20Updated 4 months ago
- ☆53Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Updated 7 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 3 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Updated 4 years ago
- PowerShell scripts for Hard Drive forensics and parsing Windows Artifacts☆56Updated 5 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆58Updated 5 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆20Updated 7 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- A powershell script for creating a Windows honeyport.☆90Updated 10 months ago
- SMTP server / sinkhole for collecting spam☆46Updated 7 years ago
- ☆54Updated 5 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆94Updated 2 years ago
- ☆61Updated 7 years ago
- OpenCV based IDN option generator PoC☆39Updated 9 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- ☆16Updated 8 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- Git Web Hook Tunnel for C2☆28Updated 2 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- ☆113Updated 8 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago