davischr2 / Cloud-Documents
This repository supports the blog site www.cloudauditcontrols.com.
☆9Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for Cloud-Documents
- PowerShell based STIG Scanner.☆11Updated last year
- Create machine images containing the Nessus vulnerability scanner☆11Updated 3 weeks ago
- ☆14Updated 3 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 2 years ago
- A curated list of Cloud Security techniques and tools☆30Updated last year
- Virtual machines that are set up with a variety of known vulnerabilities.☆12Updated 2 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 5 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆10Updated 6 months ago
- Lets you write arbitrary registry entries to Group Policy related .pol files (e.g. registry.pol)☆11Updated 5 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- Appilot is a Platform for ready to use Social Media Automation Bots on Real Devices, Android and Emulators. NO ADB, NO LAPTOP Needed.☆18Updated 3 weeks ago
- ☆8Updated 3 years ago
- PowerShell wrapper for nmap, allows easy scanning of many hosts and subnets☆17Updated 6 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆20Updated 2 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Updated 4 years ago
- Cmdlets for capturing Windows Events☆13Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- Automated Static Analysis Framework☆10Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- Brute Force and Scan WinRm Service☆13Updated 4 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Yet another powerful payload encoder/decoder☆12Updated 2 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆35Updated last month