kravietz / cspbuilderLinks
Content Security Policy report receiver and interactive policy builder (the code behind former CspBuilder.info)
☆8Updated 3 years ago
Alternatives and similar repositories for cspbuilder
Users that are interested in cspbuilder are comparing it to the libraries listed below
Sorting:
- Subscriptions to collect Windows Event Logs mapped to the MITRE ATT&CK model☆12Updated 4 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 8 months ago
- A script to automate Jenkins credential store decryption☆17Updated 7 years ago
- 🤖 Daily updated translation maps for T-Pot☆22Updated last year
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- Scripts for encoding files through DNS TXT records☆11Updated 8 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Notebook collection☆10Updated 6 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 6 years ago
- introduction to distributed scanning using vultr☆11Updated 8 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last week
- Working through Practical Malware Analysis from No Starch Press☆13Updated 8 years ago
- A DMARC deployment/monitoring tool written in python.☆16Updated 8 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- A firewall penetration testing tool suite.☆11Updated 8 years ago
- Restructured and Collaborated SIEM and CVSS Infrastructure. Presented at Blackhat Asia Arsenal 2020.☆4Updated 2 years ago
- Python script for privilege escalation for Python☆11Updated 5 years ago
- Example Suricata rules implementing some of my detection tactics☆20Updated 2 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- ☆11Updated 7 years ago
- ☆15Updated 5 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Perl script to bruteforce SSH known_hosts files.☆25Updated 10 years ago
- ☆25Updated 4 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 6 years ago