cisagov / skeleton-dockerLinks
A skeleton project for quickly getting a new cisagov Docker container started.
☆19Updated 2 weeks ago
Alternatives and similar repositories for skeleton-docker
Users that are interested in skeleton-docker are comparing it to the libraries listed below
Sorting:
- A generic skeleton project for quickly getting a new cisagov project started.☆18Updated 2 weeks ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated last month
- THOR APT Scanner User Manual☆20Updated last week
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Updated 6 months ago
- Guidance for blocking outdated web technologies. #nsacyber☆63Updated 4 years ago
- ExtraHop public code examples☆36Updated last week
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 3 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Updated 2 years ago
- Certbot container that stores its configuration in an AWS S3 bucket☆15Updated 3 weeks ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Updated 5 years ago
- Falcon Integration Gateway (FIG)☆21Updated this week
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Updated 4 years ago
- ☆12Updated 8 years ago
- A PoC backdoor that uses Gmail as a C&C server☆13Updated 5 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆29Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Various components we use in labs☆10Updated 5 years ago
- Logs key Windows process performance metrics. #nsacyber☆69Updated 3 years ago
- A web front-end providing a REST-ful API to mount and unmount forensic disk images☆22Updated this week
- ☆21Updated 2 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated 3 weeks ago
- Generic Signature Format for SIEM Systems☆14Updated 4 years ago
- ☆12Updated 3 years ago
- Integrate IBM QRadar and RPA to automate security L1 tasks.☆14Updated 3 years ago
- Automated pshtt, trustymail, and sslyze scanning☆28Updated last month
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last month
- Training scenarios for cyber ranges☆14Updated 5 years ago
- CISA is hiring! We’re looking for candidates passionate about our mission to lead the national effort to understand and manage cyber and …☆75Updated last year