davidski / VulnPryerLinks
🎯 Vulnerability Pryer - Prying context into your vulnerability data
☆21Updated 3 years ago
Alternatives and similar repositories for VulnPryer
Users that are interested in VulnPryer are comparing it to the libraries listed below
Sorting:
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Updated 12 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- first commit☆20Updated last year
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆11Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 2 months ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- A Python library for being a CND Batman....☆35Updated 9 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 7 years ago
- AYY LMAO☆22Updated 9 years ago
- Vulnerable Grails application☆43Updated 10 years ago
- IRMA ansible☆24Updated 8 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- ☆12Updated 8 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆17Updated 9 years ago
- Custom slash command to do a basic nmap scan from within Slack☆25Updated 9 years ago
- ☆50Updated 9 years ago
- A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.☆15Updated 7 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 9 months ago