kravietz / cspbuilder
Content Security Policy report receiver and interactive policy builder (the code behind former CspBuilder.info)
☆8Updated 3 years ago
Alternatives and similar repositories for cspbuilder:
Users that are interested in cspbuilder are comparing it to the libraries listed below
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- Subscriptions to collect Windows Event Logs mapped to the MITRE ATT&CK model☆12Updated 4 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆14Updated 6 years ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆29Updated 6 years ago
- Kibana app for RedELK☆16Updated last year
- Standardizing Security Titles☆13Updated 2 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 7 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- A script to automate Jenkins credential store decryption☆17Updated 6 years ago
- This tool helps you pentest THE PAST of a website.☆16Updated 4 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Restructured and Collaborated SIEM and CVSS Infrastructure. Presented at Blackhat Asia Arsenal 2020.☆4Updated 2 years ago
- Python script for privilege escalation for Python☆11Updated 4 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 6 years ago
- Training scenarios for cyber ranges☆11Updated 4 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 5 months ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 7 years ago
- Library and example applications for using/abusing the information-leaky L2Trace service on Cisco switches. PSIRT Advisory: cisco-sa-2019…☆3Updated 2 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Updated last year
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last month
- Build Automated Machine Images for MISP☆28Updated last year
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 7 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago