cisagov / gathererLinks
Gather domains as a precursor to scanning
☆19Updated 2 weeks ago
Alternatives and similar repositories for gatherer
Users that are interested in gatherer are comparing it to the libraries listed below
Sorting:
- OCSP Responder monitor☆36Updated last year
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 5 years ago
- Certificate Revocation List monitor☆44Updated last year
- Certbot container that stores its configuration in an AWS S3 bucket☆15Updated last month
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Updated 3 months ago
- Create machine images containing the Guacamole remote desktop gateway☆11Updated 2 weeks ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- Automated pshtt, trustymail, and sslyze scanning☆27Updated last month
- Falcon Integration Gateway (FIG)☆20Updated 3 weeks ago
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆36Updated last year
- Generate HTTPS reports based on scan data☆15Updated last month
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- Dependency vulnerability auditor for Ruby☆13Updated 9 months ago
- A Security Results Viewer for the web with storage, teams and history☆35Updated 2 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated 3 weeks ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last month
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated 3 months ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- GSA Security Benchmarks and Tools☆21Updated 5 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆17Updated 2 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated last week
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆42Updated last month
- ☆16Updated 4 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆28Updated last year
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- A skeleton project for quickly getting a new cisagov Docker container started.☆19Updated 2 weeks ago
- AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning☆22Updated last week
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Updated 11 years ago