cisagov / lambda_functionsLinks
Generate AWS Lambda environment zip files for use by cisagov/domain-scan
☆12Updated 2 years ago
Alternatives and similar repositories for lambda_functions
Users that are interested in lambda_functions are comparing it to the libraries listed below
Sorting:
- Automated pshtt, trustymail, and sslyze scanning☆27Updated last week
- cloud.gov security policies and procedures☆26Updated 6 months ago
- A toolkit to generate an offline Chrome extension to detect phishing attacks using a bespoke convolutional neural network.☆132Updated 8 years ago
- A lightweight pipeline, locally or in Lambda, for scanning things like HTTPS, third party service use, and web accessibility.☆386Updated 4 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Updated this week
- VPS Network Cloud Web Applications☆24Updated 3 weeks ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- Python and PowerShell utilities for finding installed browser extensions, plug-ins and add-ons☆24Updated 9 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆107Updated 7 years ago
- Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This applicatio…☆14Updated 11 years ago
- Generate HTTPS reports based on scan data☆15Updated last week
- This repo contains all of my OS hardening scripts☆69Updated 8 years ago
- Scan domains and return data based on trustworthy email best practices☆214Updated this week
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 5 months ago
- Top Level Domain data☆69Updated 5 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- Legal, procedural and policies document templates for operating an IRT☆65Updated last year
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificates☆51Updated 7 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Updated 9 years ago
- ☆53Updated 7 years ago
- generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)☆33Updated 2 years ago
- Local Maltego Transforms for crt.sh☆12Updated 8 years ago
- Basic script for monitoring new posts on Pastebin for keywords☆12Updated 9 years ago
- ☆17Updated 7 years ago
- Bringing DevOps to Forensics☆34Updated 10 years ago
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆99Updated 9 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆293Updated 2 years ago
- Paskto - Passive Web Scanner☆152Updated 6 years ago