michenriksen / dia-attacktreeLinks
Attack Tree modeling sheet for Dia
☆20Updated 7 years ago
Alternatives and similar repositories for dia-attacktree
Users that are interested in dia-attacktree are comparing it to the libraries listed below
Sorting:
- DNS Enumeration and Reconnaissance Tool☆36Updated 10 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 6 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆40Updated last year
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 3 years ago
- Legal, procedural and policies document templates for operating an IRT☆65Updated last year
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆20Updated 7 years ago
- ☆50Updated 9 years ago
- A script to track malware IOCs with OSINT on Twitter.☆54Updated last year
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 3 months ago
- POLAR☆74Updated 6 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- Collection of information security policies.☆29Updated 8 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Updated 11 years ago
- Material from our CANAPE workshop☆32Updated 7 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Yara syntax highlighting☆25Updated 4 years ago
- Websocket based egress tester☆20Updated 9 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 9 years ago
- ☆52Updated 7 years ago
- Plugins written for CVE-Search☆27Updated 4 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- Puny Domain Name Check☆38Updated 6 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago