cisagov / scanner
Automated pshtt, trustymail, and sslyze scanning
☆24Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for scanner
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆14Updated this week
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆37Updated last year
- A few quick recipes for those that do not have much time during the day☆21Updated 3 weeks ago
- AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning☆19Updated this week
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 6 years ago
- ☆21Updated last year
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆31Updated last year
- Build Automated Machine Images for MISP☆28Updated last year
- first commit☆20Updated last year
- ☆14Updated 3 years ago
- Learn you a book for some infosec good☆62Updated 4 years ago
- ☆29Updated 6 years ago
- Vulnerability Management tool using the CVE-Search database☆10Updated 8 years ago
- This repository is a curated list of pro bono incident response entities.☆19Updated last year
- AWS Incident Response Kit (AIRK) - AWS Incident Response☆21Updated 4 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- A bunch of scripts I use to work with urlscan.io☆33Updated 5 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆34Updated 8 years ago
- Build your own threat hunting maturity model☆12Updated 7 years ago
- Security Assessment Data Management and Analysis Tool☆38Updated 3 years ago
- A few transforms and a machine for parsing Nmap XML results☆35Updated 8 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- Manage GuardDuty At Enterprise Scale☆22Updated 4 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆18Updated 3 years ago
- Discover "HotSpots" - potential spots for credentials theft☆23Updated 6 years ago
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Updated 4 years ago