cisagov / scannerLinks
Automated pshtt, trustymail, and sslyze scanning
☆27Updated 2 months ago
Alternatives and similar repositories for scanner
Users that are interested in scanner are comparing it to the libraries listed below
Sorting:
- Save scan results to a database☆12Updated 2 months ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Updated 3 weeks ago
- AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning☆22Updated this week
- ☆21Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- New version of the buildkit repository☆9Updated 3 years ago
- Email Cyber Hygiene, Trustworthy Email, and HTTPS reports to the appropriate technical or distribution addresses☆13Updated last month
- Generate HTTPS reports based on scan data☆15Updated 2 months ago
- first commit☆20Updated last year
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 2 weeks ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Updated 7 years ago
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Updated last month
- Various components we use in labs☆10Updated 4 years ago
- ☆11Updated 4 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- ☆15Updated 4 years ago
- Maltego transform for visualizing Nessus scan data☆47Updated 5 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆30Updated 4 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Updated 5 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆37Updated 4 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago