cisagov / scannerLinks
Automated pshtt, trustymail, and sslyze scanning
☆27Updated this week
Alternatives and similar repositories for scanner
Users that are interested in scanner are comparing it to the libraries listed below
Sorting:
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Updated last month
- Save scan results to a database☆12Updated this week
- Generate HTTPS reports based on scan data☆15Updated 2 weeks ago
- Maltego integration of https://haveibeenpwned.com☆60Updated 4 months ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 8 months ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 6 years ago
- ☆15Updated 4 years ago
- New version of the buildkit repository☆9Updated 3 years ago
- ☆21Updated 2 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- ☆11Updated 3 years ago
- ☆39Updated 4 years ago
- Subscriptions to collect Windows Event Logs mapped to the MITRE ATT&CK model☆12Updated 4 years ago
- Maltego transform for visualizing Nessus scan data☆47Updated 5 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated 3 weeks ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆34Updated 8 years ago
- Useful commands for infosec☆29Updated 2 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- first commit☆20Updated last year
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated last month
- ☆30Updated 6 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆54Updated 2 years ago
- Sharing Threat Hunting runbooks☆26Updated 6 years ago