Harden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.
☆195Sep 3, 2021Updated 4 years ago
Alternatives and similar repositories for hardentheworld
Users that are interested in hardentheworld are comparing it to the libraries listed below
Sorting:
- Some dfir stuff☆31Jan 12, 2022Updated 4 years ago
- ☆13Jun 17, 2019Updated 6 years ago
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 9 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Python OSINT Tool to retrieve information from Skype☆76Oct 12, 2015Updated 10 years ago
- ☆75Aug 29, 2014Updated 11 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- Honeynet Project generic authenticated datafeed protocol☆218Oct 19, 2023Updated 2 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- Collection of IOCs related to targeting of civil society☆189Nov 11, 2021Updated 4 years ago
- A forensic evidence collection & analysis toolkit for OS X☆1,892Jun 19, 2019Updated 6 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Preventing OS X from phoning home to Cupertino☆298Jul 8, 2018Updated 7 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- A library for efficient interception of established TCP connections☆20Oct 12, 2015Updated 10 years ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Oct 21, 2018Updated 7 years ago
- Quick script to set up VPN server and reverse VPN for Nethunter☆38Aug 22, 2016Updated 9 years ago
- Browser extension that uses intelligence to combat malicious websites by blocking them in real-time.☆60Dec 6, 2020Updated 5 years ago
- GeoIP plotting script written in Python to help security teams draw visualized reports from IP addresses☆20May 29, 2022Updated 3 years ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Jul 24, 2015Updated 10 years ago
- A curated list of tools for incident response☆34Mar 2, 2024Updated 2 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- A Python teaching tool☆20Aug 24, 2012Updated 13 years ago
- Best Current Practices regarding secure online communication and configuration of services using cryptography.☆701Jan 23, 2022Updated 4 years ago
- A low to medium interaction honeypot.☆472Mar 21, 2024Updated last year
- ☆24Apr 7, 2018Updated 7 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Application which generates the structure and related files necessary for developing a Data Exchange Layer (DXL) integration with Python☆12Mar 17, 2020Updated 5 years ago
- POSIX sh formatter and client for tldr pages☆12Dec 27, 2022Updated 3 years ago
- Alternative to Python's module `cgitb` with template inspired by http://nette.org/ and https://www.djangoproject.com/☆14Mar 4, 2017Updated 9 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Generic Signature Format for SIEM Systems☆14Oct 27, 2021Updated 4 years ago
- This is an OS X Privilege escalation exploit. The Payload function of this exploit is sending a root shell. Change the IP and the destina…☆34Dec 16, 2016Updated 9 years ago