cisagov / skeleton-docker
A skeleton project for quickly getting a new cisagov Docker container started.
☆19Updated this week
Alternatives and similar repositories for skeleton-docker
Users that are interested in skeleton-docker are comparing it to the libraries listed below
Sorting:
- A generic skeleton project for quickly getting a new cisagov project started.☆18Updated last week
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆18Updated last month
- New version of the buildkit repository☆9Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated last month
- A curated list of Cloud Security techniques and tools☆29Updated last year
- ☆11Updated 4 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated last month
- ☆11Updated 3 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- A command-line whois - like client for the WHOIS and WHOIS History APIs by WhoisXML API Inc.☆18Updated 3 years ago
- Information about CIGIE, CIGIE Shared Services, CIGIE on GitHub Enterprise Cloud, and onboarding instructions.☆10Updated last year
- Training scenarios for cyber ranges☆11Updated 5 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- This repo contains information on how to auto deploy Sysmon via GPO and Task Scheduler☆12Updated 3 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- Various components we use in labs☆10Updated 4 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆29Updated 5 months ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- Automated pshtt, trustymail, and sslyze scanning☆27Updated last month
- Useful scripts I have made for pentests. (nothing pretty)☆9Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- ☆21Updated 2 years ago
- ☆11Updated 4 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- A PoC backdoor that uses Gmail as a C&C server☆14Updated 4 years ago