davischr2 / Cloud-DocumentsLinks
This repository supports the blog site www.cloudauditcontrols.com.
☆11Updated last month
Alternatives and similar repositories for Cloud-Documents
Users that are interested in Cloud-Documents are comparing it to the libraries listed below
Sorting:
- PowerShell based STIG Scanner.☆11Updated 2 years ago
- ☆11Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 3 years ago
- Lets you write arbitrary registry entries to Group Policy related .pol files (e.g. registry.pol)☆11Updated 5 years ago
- Docker container for running OWASP WebGoat.NET application☆11Updated 7 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 4 years ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆13Updated last year
- RATs library 2003 to present☆14Updated last year
- A curated list of Cloud Security techniques and tools☆29Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆18Updated last year
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- Simple utility to manage multiple ssh☆15Updated 2 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Updated 5 years ago
- ☆11Updated 3 years ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆29Updated 7 years ago
- This is a tool box for CIS Windows Hardening☆8Updated 9 months ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- AWS Security Tool☆30Updated last year
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 7 months ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated this week
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Updated 10 years ago
- DevGuard Web Frontend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate…☆16Updated this week
- Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases☆13Updated 4 years ago