minvws / nl-kat-coordinationLinks
OpenKAT scans networks, finds vulnerabilities and creates accessible reports. It integrates the most widely used network tools and scanning software into a modular framework, accesses external databases such as shodan, and combines the information from all these sources into clear reports. It also includes lots of cat hair.
☆143Updated this week
Alternatives and similar repositories for nl-kat-coordination
Users that are interested in nl-kat-coordination are comparing it to the libraries listed below
Sorting:
- Internet standards compliance test suite☆200Updated this week
- The "TaSK Framework" is a configurable test tool for performing TLS conformity tests based on the Technical Guideline TR-03116-TS.☆139Updated 2 years ago
- Sample programs to access the API☆92Updated 5 months ago
- A parser for SPF and DMARC DNS records☆291Updated this week
- Methodiek voor Informatiebeveiligingsonderzoek met Auditwaarde☆23Updated 9 months ago
- Docker image for MISP☆134Updated 2 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 9 months ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆120Updated last week
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated last week
- Random Cyber Threat Intelligence☆48Updated 8 months ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆381Updated this week
- Add a layer of active defense to your cloud applications.☆95Updated last week
- ☆95Updated last week
- List of past and future infosec related events.☆162Updated this week
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆108Updated last month
- ☆119Updated 2 years ago
- External monitoring for organization assets☆415Updated last year
- OS image for the PiRogue based on Debian 12☆161Updated last year
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆270Updated this week
- Home for TRANSITS materials☆25Updated last year
- Tool to guess CPE name based on common software name☆104Updated 3 weeks ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 11 months ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆56Updated last week
- A standard for reducing log volume without sacrificing analytical capability☆210Updated 7 months ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆90Updated last week
- 34 Policy Templates☆87Updated last year
- ☆101Updated last year
- verinice is a tool for managing information security.☆206Updated 8 months ago
- Scan systems and docker images for potential log4j vulnerabilities. Able to patch (remove JndiLookup.class) from layered archives. Will d…☆47Updated 3 years ago
- Mirror of cisa.gov/kev data files☆58Updated this week