janos / compromisedLinks
Compromised/Pwned Passwords API On-premisses
☆27Updated 3 years ago
Alternatives and similar repositories for compromised
Users that are interested in compromised are comparing it to the libraries listed below
Sorting:
- A library and a tool for converting audit logs to XML and JSON☆46Updated 8 years ago
- CSP (Content Security Policy) reports server which forwards reports to Elasticsearch.☆59Updated 2 years ago
- Centralized IP reputation daemon☆60Updated last year
- Shell wrapper to run a login shell with `sudo` as the current user for the purpose of audit logging☆95Updated 3 years ago
- from http://www.pc-tools.net/unix/grepcidr/☆90Updated 8 years ago
- A starter-kit for a source-controlled, CLI-based osquery management workflow.☆30Updated 7 years ago
- Certonid is a Serverless SSH Certificate Authority☆78Updated 3 months ago
- A tool to monitor a certificate transparency log for operational problems☆191Updated 2 years ago
- Manageable report from lynis text output, in various formats.☆79Updated 10 months ago
- Another utility to analyze state of deployment of security-related email protocols.☆68Updated 2 years ago
- A dnstwist wrapper for monitoring for possible typo sqatting/spear phishing domains☆119Updated 2 years ago
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- Hardened debian linux baseimage for Docker.☆42Updated 2 years ago
- App to perform testing and validation of firewall rules☆66Updated 4 years ago
- RPZ Zone Files to Block DNS-over-HTTPS☆90Updated 4 years ago
- A low/zero interaction ssh authentication logging honeypot☆25Updated this week
- Rumble Network Discovery API☆17Updated last year
- A Passive SSH back-end and scanner.☆104Updated 7 months ago
- Command line utility for parsing certificates☆67Updated 4 years ago
- Scan domains and return data based on trustworthy email best practices☆216Updated last month
- I can keep a SSHecret☆72Updated 2 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆110Updated 7 years ago
- SSH CA administration via CLI and GUI☆69Updated 9 months ago
- Serverless, Zero-Trust SSH for Microsoft Azure☆77Updated 6 months ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆57Updated 2 months ago
- Manage, monitor and improve your cyber security posture.☆93Updated 2 years ago
- Simple shell scripts for DNS and DNSSEC monitoring☆18Updated 3 years ago
- A parser for SPF and DMARC DNS records☆303Updated 3 weeks ago
- An example of how to leverage `step ssh` to achieve Single Sign-On for SSH☆50Updated 5 years ago
- Create Logstash events from the Okta API!☆19Updated 3 years ago