janos / compromisedLinks
Compromised/Pwned Passwords API On-premisses
☆25Updated 2 years ago
Alternatives and similar repositories for compromised
Users that are interested in compromised are comparing it to the libraries listed below
Sorting:
- Centralized IP reputation daemon☆60Updated 10 months ago
- from http://www.pc-tools.net/unix/grepcidr/☆90Updated 8 years ago
- A library and a tool for converting audit logs to XML and JSON☆45Updated 7 years ago
- Shell wrapper to run a login shell with `sudo` as the current user for the purpose of audit logging☆96Updated 3 years ago
- A Passive SSH back-end and scanner.☆103Updated 2 months ago
- CSP (Content Security Policy) reports server which forwards reports to Elasticsearch.☆58Updated 2 years ago
- Certonid is a Serverless SSH Certificate Authority☆77Updated 5 months ago
- A starter-kit for a source-controlled, CLI-based osquery management workflow.☆30Updated 7 years ago
- Manageable report from lynis text output, in various formats.☆75Updated 4 months ago
- A tool to monitor a certificate transparency log for operational problems☆186Updated 2 years ago
- Serverless, Zero-Trust SSH for Microsoft Azure☆76Updated last month
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆109Updated 6 years ago
- Create Logstash events from the Okta API!☆19Updated 2 years ago
- Osquery Mangement Server☆115Updated 5 years ago
- Command line utility for parsing certificates☆65Updated 4 years ago
- The command-line client for Journal☆12Updated 10 months ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 5 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- A firewall management system.☆90Updated 4 months ago
- A dnstwist wrapper for monitoring for possible typo sqatting/spear phishing domains☆120Updated last year
- Hardened debian linux baseimage for Docker.☆41Updated 2 years ago
- ☆73Updated last year
- A low/zero interaction ssh authentication logging honeypot☆23Updated last year
- Utility for annotating Internet datasets with contextual metadata (e.g., origin AS, MaxMind GeoIP2, reverse DNS, and WHOIS)☆102Updated 2 months ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- VulsRepo is visualized based on the json report output in vuls.☆35Updated 3 years ago
- Manage, monitor and improve your cyber security posture.☆93Updated 2 years ago
- CryptoNice is both a command line tool and library which provides the ability to scan and report on the configuration of SSL/TLS for your…☆101Updated 4 years ago
- ☆66Updated 5 years ago
- App to perform testing and validation of firewall rules☆64Updated 4 years ago