cisagov / scanner
Automated pshtt, trustymail, and sslyze scanning
☆27Updated 3 weeks ago
Alternatives and similar repositories for scanner:
Users that are interested in scanner are comparing it to the libraries listed below
- Save scan results to a database☆12Updated 3 weeks ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆18Updated 3 weeks ago
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning☆21Updated this week
- ☆21Updated 2 years ago
- first commit☆20Updated last year
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- New version of the buildkit repository☆9Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Various scripts to help you out. Mostly very scrappy, but functional. I realise Write-Host is not the way to do things, but I wrote som…☆27Updated 2 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- ☆15Updated 3 years ago
- Various components we use in labs☆10Updated 4 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 2 months ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Rapid Assessment of Web Resources☆18Updated 8 years ago
- Data related to the SANS Internet Storm Center☆10Updated 6 years ago
- ☆53Updated 6 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Updated last week
- Maltego transform for visualizing Nessus scan data☆46Updated 5 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Updated 7 years ago
- Subscriptions to collect Windows Event Logs mapped to the MITRE ATT&CK model☆12Updated 4 years ago
- ☆11Updated 3 years ago
- Microsoft Flow Attack Framework☆23Updated 5 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 6 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago