janos / compromisedLinks
Compromised/Pwned Passwords API On-premisses
☆27Updated 3 years ago
Alternatives and similar repositories for compromised
Users that are interested in compromised are comparing it to the libraries listed below
Sorting:
- A library and a tool for converting audit logs to XML and JSON☆46Updated 7 years ago
- Centralized IP reputation daemon☆59Updated last year
- Shell wrapper to run a login shell with `sudo` as the current user for the purpose of audit logging☆95Updated 3 years ago
- Manage, monitor and improve your cyber security posture.☆93Updated 2 years ago
- A starter-kit for a source-controlled, CLI-based osquery management workflow.☆30Updated 7 years ago
- A Passive SSH back-end and scanner.☆104Updated 6 months ago
- CSP (Content Security Policy) reports server which forwards reports to Elasticsearch.☆59Updated 2 years ago
- from http://www.pc-tools.net/unix/grepcidr/☆90Updated 8 years ago
- A firewall management system.☆91Updated 8 months ago
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- Hardened debian linux baseimage for Docker.☆41Updated 2 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆110Updated 7 years ago
- Certonid is a Serverless SSH Certificate Authority☆78Updated last month
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 5 years ago
- A low/zero interaction ssh authentication logging honeypot☆25Updated 2 months ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 7 years ago
- Certificate Revocation check support for caddy☆24Updated last week
- A dnstwist wrapper for monitoring for possible typo sqatting/spear phishing domains☆119Updated 2 years ago
- Manageable report from lynis text output, in various formats.☆77Updated 8 months ago
- Automated testing, generation & manipulation of #osquery packs☆73Updated last year
- I can keep a SSHecret☆71Updated last year
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- An open source software directory and release tracker.☆25Updated last week
- A tool to monitor a certificate transparency log for operational problems☆191Updated 2 years ago
- RPZ Zone Files to Block DNS-over-HTTPS☆90Updated 4 years ago
- DNS and dig is ugly, and implementing them into your web application is even uglier. But not any longer, for here is dnsjson.com☆18Updated 5 years ago
- ioc2rpz is a place where threat intelligence meets DNS.☆112Updated 11 months ago
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- Certificate Transparency Log aggregation, parsing, and streaming service written in Elixir☆323Updated last month
- Scan domains and return data based on trustworthy email best practices☆214Updated this week