mozilla / security
Repository for various tools around security
☆42Updated 10 months ago
Alternatives and similar repositories for security
Users that are interested in security are comparing it to the libraries listed below
Sorting:
- Minion Frontend☆30Updated 6 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- Creates a CloudFormation stack for running Security Monkey☆27Updated 6 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- The vulnerability disclosure policy for 18F and GSA's Technology Transformation Service.☆27Updated 3 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- ☆11Updated 4 years ago
- Python code shared by Scout2 and AWS-Recipes☆24Updated 6 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated 2 years ago
- Launchd daemon that reports major OSX modifications through growl☆16Updated 10 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Updated 7 years ago
- DefectDojo Documentation☆17Updated 3 years ago
- Run DependencyCheck Against Your Orgs GitHub Repos.☆14Updated 7 years ago
- INACTIVE - http://mzl.la/ghe-archive - Vagrantfile and Dockerfiles that help make minion development and deployment far easier☆13Updated 6 years ago
- Ruby API client for the Censys internet-wide network-scan search engine☆10Updated 8 months ago
- ZAP Management Scripts☆23Updated this week
- Tools for AWS forensics☆63Updated 9 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- Inspect your builds to look for changes in filesystem, network traffic and running processes.☆13Updated 6 years ago
- badbucket checks your s3 bucket for common misconfigurations☆23Updated 7 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- ☆11Updated 8 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆26Updated last month
- Custom slash command to find all a domains A records from within Slack☆11Updated 9 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- A tool to generate statistics and help manage bug bounty reports in HackerOne.☆22Updated 5 years ago
- WikiMo documentation (mainly the security space, but everyone's welcome to use this)☆66Updated last year