cisagov / lambda_functionsLinks
Generate AWS Lambda environment zip files for use by cisagov/domain-scan
☆12Updated 2 years ago
Alternatives and similar repositories for lambda_functions
Users that are interested in lambda_functions are comparing it to the libraries listed below
Sorting:
- Automated pshtt, trustymail, and sslyze scanning☆28Updated last month
- Generate HTTPS reports based on scan data☆15Updated 2 weeks ago
- A lightweight pipeline, locally or in Lambda, for scanning things like HTTPS, third party service use, and web accessibility.☆388Updated 4 years ago
- Basic script for monitoring new posts on Pastebin for keywords☆12Updated 9 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- A toolkit to generate an offline Chrome extension to detect phishing attacks using a bespoke convolutional neural network.☆132Updated 8 years ago
- cloud.gov security policies and procedures☆26Updated 8 months ago
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆99Updated 9 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Updated last week
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 8 months ago
- Program to analyze mails stored into a Microsoft Outlook PST file and find one based on search keywords.☆58Updated 6 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework. #nsacyber☆164Updated 5 years ago
- ☆17Updated 7 years ago
- Repo for MIRR Workshop Heroku app☆52Updated 5 years ago
- Python and PowerShell utilities for finding installed browser extensions, plug-ins and add-ons☆25Updated 9 years ago
- Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This applicatio…☆14Updated 11 years ago
- Various scripts to help you out. Mostly very scrappy, but functional. I realise Write-Host is not the way to do things, but I wrote som…☆27Updated 3 years ago
- ☆13Updated 9 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆105Updated 8 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆128Updated 8 years ago
- ☆53Updated 7 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆56Updated last year
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆201Updated 9 years ago
- This script runs several security checks and makes modifications (with your permission) to your Active Directory domain to improve it's s…☆45Updated 10 years ago
- Scan domains and return data based on trustworthy email best practices☆216Updated last month
- Windows PowerShell domain scanning tool☆54Updated 9 years ago
- PowerShell Module for automating Tenable Nessus Vulnerability Scanner.☆88Updated 3 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆51Updated 8 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 6 years ago