google / tsunami-security-scanner-testbed
☆9Updated last year
Related projects ⓘ
Alternatives and complementary repositories for tsunami-security-scanner-testbed
- ☆14Updated 3 months ago
- An MSF plugin to send notifications to Slack when shells are created or killed☆14Updated 7 years ago
- IOCs from Google's Threat Analysis Group (TAG)☆27Updated last month
- Following repository contains source codes used in my two Books.☆10Updated 9 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated 9 months ago
- Automate the regular transfer of AIS data into a MISP Server☆6Updated 5 months ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 6 months ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Fedramp.gov source code for site built on https://federalist.18f.gov/☆3Updated this week
- ☆10Updated 8 years ago
- Automated Static Analysis Framework☆10Updated 2 years ago
- A collection of personal ZAP scripts☆13Updated last year
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 3 years ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆11Updated 9 months ago
- Repository to archive GCP Documentation for local use☆13Updated 3 weeks ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Training scenarios for cyber ranges☆11Updated 4 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 4 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆18Updated 3 years ago
- Gather domains as a precursor to scanning☆16Updated 2 months ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆10Updated 3 years ago
- ☆21Updated 3 weeks ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- InSpec Profile to validate the secure configuration of aws-rds-infrastructure-cis-baseline, against CIS's Amazon Web Services Three-tier …☆13Updated 2 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆44Updated 7 years ago
- Create machine images containing the Nessus vulnerability scanner☆11Updated 3 weeks ago