cisagov / scannerLinks
Automated pshtt, trustymail, and sslyze scanning
☆27Updated this week
Alternatives and similar repositories for scanner
Users that are interested in scanner are comparing it to the libraries listed below
Sorting:
- ☆21Updated 2 years ago
- Various components we use in labs☆10Updated 5 years ago
- ☆53Updated 7 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆33Updated 2 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 7 years ago
- ☆30Updated 7 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 7 months ago
- Traceroute improved wrapper for CSIRT and CERT operators☆39Updated last year
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆22Updated 8 years ago
- Quick binary search for NTLM hash dataset☆18Updated 6 years ago
- Generate HTTPS reports based on scan data☆15Updated this week
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- ☆16Updated 4 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Updated 2 weeks ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Updated 4 years ago
- Maltego integration of https://haveibeenpwned.com☆62Updated 9 months ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Clean public password dump files and store in ELK☆38Updated 7 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Updated 5 years ago
- A bunch of scripts I use to work with urlscan.io☆35Updated 6 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 7 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆94Updated 2 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆65Updated 2 years ago