AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning
☆23Mar 2, 2026Updated last week
Alternatives and similar repositories for cyhy_amis
Users that are interested in cyhy_amis are comparing it to the libraries listed below
Sorting:
- Automated pshtt, trustymail, and sslyze scanning☆30Feb 18, 2026Updated 2 weeks ago
- Certbot container that stores its configuration in an AWS S3 bucket☆15Mar 2, 2026Updated last week
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Feb 27, 2026Updated last week
- Gather domains as a precursor to scanning☆21Feb 18, 2026Updated 2 weeks ago
- Debian CIS Hardening Ansible Role☆22Sep 23, 2021Updated 4 years ago
- Scripts and things.☆13Jan 23, 2026Updated last month
- agisoft photogrammetry processing scripts☆12Mar 18, 2016Updated 9 years ago
- This is a bash script used for ISPConfig 3 server migrations☆15Sep 13, 2016Updated 9 years ago
- Left To My Own Devices - NT hash tools☆40Aug 4, 2022Updated 3 years ago
- Infrastructure Bot for your organization☆10Jun 9, 2025Updated 9 months ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- ☆14Sep 29, 2025Updated 5 months ago
- A system agnostic tool to export your Foundry character sheet to a PDF!☆14Jul 3, 2025Updated 8 months ago
- Fitbit SDK example application.☆10Mar 7, 2023Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- A generic skeleton project for quickly getting a new cisagov project started.☆18Mar 2, 2026Updated last week
- A tool for parsing DMARC aggregate reports.☆11Nov 10, 2022Updated 3 years ago
- Data collection forms builder for NextGIS Mobile☆12Apr 9, 2025Updated 11 months ago
- A CNI plugin for Kubernetes that allows you to connect pods to a Webmesh network.☆16Nov 12, 2023Updated 2 years ago
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Jan 21, 2021Updated 5 years ago
- mirror of☆11Apr 4, 2018Updated 7 years ago
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- Java API library for BSI TR-03110 cv certificates used for Extended Access Control (EAC)☆12Apr 24, 2025Updated 10 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Recordization library☆11Feb 27, 2026Updated last week
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- A bot for Binance written in python☆10Jan 10, 2026Updated last month
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Apr 28, 2021Updated 4 years ago
- A Test Titanium App using ES6 and Promises☆11Jun 10, 2017Updated 8 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- Use the JetPac DeepBeliefSDK framework in Appcelerator Titanium☆11Jun 23, 2017Updated 8 years ago
- Here you find the complete list of enrichments and extractionsfor Ubikron.☆33Updated this week
- Setup for the kubernetes systems to control and run all the MLab nodes around the world☆12Feb 27, 2026Updated last week
- Forensics Science Education☆11Apr 26, 2021Updated 4 years ago
- Official Black Hat Arsenal Security Tools Repository☆12Aug 3, 2017Updated 8 years ago
- Scan domains and return data based on trustworthy email best practices☆218Dec 31, 2025Updated 2 months ago
- Learn terraform with openstack provide☆12Dec 20, 2018Updated 7 years ago
- Mininet monitoring and plotting utilities☆20Aug 17, 2017Updated 8 years ago
- ☆14Mar 3, 2023Updated 3 years ago