davidski / VulnPryerLinks
🎯 Vulnerability Pryer - Prying context into your vulnerability data
☆21Updated 3 years ago
Alternatives and similar repositories for VulnPryer
Users that are interested in VulnPryer are comparing it to the libraries listed below
Sorting:
- first commit☆20Updated last year
- ☆12Updated 8 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 9 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- A Python library for being a CND Batman....☆35Updated 9 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆25Updated 3 months ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- INACTIVE - http://mzl.la/ghe-archive - Unit Tests for your Network -☆44Updated 6 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 2 months ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- Repository for Security Workshop content☆20Updated 7 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- Dig through Git commits and logs☆21Updated 6 years ago
- Pull author and committer names and emails from Travis-CI☆11Updated 5 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆39Updated 5 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Python-based cloud node for local use☆11Updated 7 years ago
- A collection of Ansible roles for automating infosec builds.☆92Updated 7 years ago
- Exfiltrate files via DNS☆95Updated 11 years ago
- AYY LMAO☆22Updated 9 years ago
- Cli interface to threatcrowd.org☆19Updated 8 years ago