cisagov / gatherer
Gather domains as a precursor to scanning
☆17Updated this week
Alternatives and similar repositories for gatherer:
Users that are interested in gatherer are comparing it to the libraries listed below
- Fedramp.gov source code for site built on https://federalist.18f.gov/☆5Updated this week
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆15Updated 3 months ago
- AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning☆20Updated this week
- Federal PKI, X.509 certificate linter☆16Updated last month
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- Create machine images containing the Guacamole remote desktop gateway☆10Updated 3 weeks ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 4 years ago
- Certbot container that stores its configuration in an AWS S3 bucket☆13Updated this week
- Automated pshtt, trustymail, and sslyze scanning☆25Updated this week
- Open source cookbooks used by the login.gov team☆10Updated last month
- Automate the regular transfer of AIS data into a MISP Server☆7Updated 8 months ago
- Generate AWS Lambda environment zip files for use by cisagov/domain-scan☆12Updated last year
- This is the old location for the FPKI Playbook. New location below.☆31Updated 3 years ago
- Create machine images containing the Nessus vulnerability scanner☆12Updated 3 weeks ago
- FedRAMP Tailored.☆43Updated 3 years ago
- A generic skeleton project for quickly getting a new cisagov project started.☆15Updated 2 months ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated last year
- A CALDERA plugin☆13Updated last year
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆19Updated this week
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- Go wrapper for kroeckx/x509lint☆14Updated 3 years ago
- Certificate Policy development and drafting for Federal Public Trust Device PKI. For more information, email fpki@gsa.gov.☆42Updated 11 months ago
- Onceler listens to your secrets and shares them exactly once.☆19Updated this week
- Checklists☆15Updated 8 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆18Updated 4 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆13Updated 2 years ago
- A forensic system baselining, searching, and evidence collection tool☆16Updated 5 years ago
- honest.security microsite☆39Updated last year