cisagov / scannerLinks
Automated pshtt, trustymail, and sslyze scanning
☆27Updated this week
Alternatives and similar repositories for scanner
Users that are interested in scanner are comparing it to the libraries listed below
Sorting:
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 6 years ago
- ☆21Updated 2 years ago
- Various components we use in labs☆10Updated 4 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Updated this week
- Quick binary search for NTLM hash dataset☆18Updated 6 years ago
- Maltego integration of https://haveibeenpwned.com☆61Updated 7 months ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆56Updated 2 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- ☆53Updated 7 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- ☆16Updated 4 years ago
- A PowerShell tool for taking screenshots of multiple web servers quickly.☆94Updated 8 years ago
- Generate HTTPS reports based on scan data☆15Updated 2 weeks ago
- Rapid Assessment of Web Resources☆18Updated 8 years ago
- Scans the typos of candidate election pages for typosquatters☆18Updated 6 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Updated 4 years ago
- Automatically exported from code.google.com/p/nipper-ng☆70Updated 3 years ago
- ☆30Updated 6 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 4 months ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- A few transforms and a machine for parsing Nmap XML results☆39Updated 9 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆21Updated 8 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆87Updated 2 years ago
- ☆28Updated 8 years ago
- Clean public password dump files and store in ELK☆38Updated 7 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆39Updated 7 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago