cisagov / sensitive-data-scanner
A tool for detecting sensitive data in code repositories
☆13Updated 3 months ago
Related projects: ⓘ
- Generic Signature Format for SIEM Systems☆14Updated 2 years ago
- Setting up a training environment for MISP☆11Updated last year
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated this week
- A few quick recipes for those that do not have much time during the day☆21Updated 3 weeks ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- Automate the regular transfer of AIS data into a MISP Server☆6Updated 3 months ago
- Build Automated Machine Images for MISP☆28Updated last year
- CyCAT.org taxonomies☆14Updated 3 years ago
- Following repository contains source codes used in my two Books.☆10Updated 8 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆17Updated 4 years ago
- Create machine images containing the Nessus vulnerability scanner☆10Updated this week
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- ☆36Updated this week
- Best practices in threat intelligence☆46Updated last year
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 7 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- ☆25Updated this week
- A repository to share contributions related to TheHive Project☆22Updated 3 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆24Updated last year
- A mapping project between tags (annotations, labels) and domain names☆11Updated 4 months ago
- Automated Static Analysis Framework☆10Updated 2 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 4 years ago
- ☆33Updated 3 years ago
- CyCAT.org API back-end server including crawlers☆30Updated last year
- Useful commands for infosec☆28Updated last year
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆15Updated 3 years ago
- ☆10Updated 3 years ago
- mud-visualizer is a tool to visualize MUD files☆9Updated 2 years ago