google / tsunami-security-scanner-testbed
☆9Updated last year
Alternatives and similar repositories for tsunami-security-scanner-testbed:
Users that are interested in tsunami-security-scanner-testbed are comparing it to the libraries listed below
- IOCs from Google's Threat Analysis Group (TAG)☆29Updated 3 months ago
- ☆15Updated 7 months ago
- CVE database☆22Updated 4 years ago
- Training scenarios for cyber ranges☆11Updated 4 years ago
- ☆21Updated last year
- Standardizing Security Titles☆13Updated 2 years ago
- ☆11Updated 8 years ago
- This library has moved to https://github.com/googleapis/google-cloud-python/tree/main/packages/google-cloud-securitycenter☆28Updated last year
- Automate the regular transfer of AIS data into a MISP Server☆7Updated 9 months ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 4 years ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆15Updated 8 years ago
- Python bindings for Yeti's API☆18Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 9 months ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- ☆10Updated 9 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Tools to automate AWS Cloud security assessments☆23Updated 5 years ago
- Before deleting a Google Workspace account, the super admin must first delete all associated Google Cloud projects, folders, and Access C…☆21Updated 2 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- ☆10Updated 2 years ago
- Repository for various tools around security☆42Updated 8 months ago
- Eddie Vetter - triage macOS applications for security research☆16Updated 3 years ago
- Exploit, Malware and Vulnerability Scoring Application☆11Updated last year
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Go wrapper for awslabs/certlint☆25Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 5 months ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- A collection of personal ZAP scripts☆14Updated last year