Guidance for blocking outdated web technologies. #nsacyber
☆63Dec 9, 2021Updated 4 years ago
Alternatives and similar repositories for Blocking-Outdated-Web-Technologies
Users that are interested in Blocking-Outdated-Web-Technologies are comparing it to the libraries listed below
Sorting:
- Configuration guidance for implementing BitLocker. #nsacyber☆127Jul 24, 2019Updated 6 years ago
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆82Oct 25, 2017Updated 8 years ago
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆114Feb 19, 2021Updated 5 years ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆144Dec 22, 2023Updated 2 years ago
- Block excessive crawlers, bots and spiders traffic on your web site 👾☆34Jul 29, 2023Updated 2 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- QGIS tools to capture and zoom to coordinates using decimal, DMS, WKT, GeoJSON, MGRS, UTM, UPS, GEOREF, ECEF, H3, and Plus Codes notation…☆323Jun 10, 2024Updated last year
- Generate reverse shells in command line with Go !☆20Aug 9, 2020Updated 5 years ago
- This project leverages Ansible to automate DataWave deployments on your cluster☆26Dec 12, 2019Updated 6 years ago
- Hacking every email by use script Mr.Robot☆57Sep 1, 2018Updated 7 years ago
- Creates a code.gov code inventory JSON file based on GitHub repository information. #nsacyber☆30Jan 16, 2019Updated 7 years ago
- Generate HTTPS reports based on scan data☆15Feb 18, 2026Updated last week
- Extreme Networks EXOS Driver implementation for the NAPALM Network Automation Project☆12Jun 28, 2021Updated 4 years ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆50Dec 18, 2017Updated 8 years ago
- Mr. Robot's EvilCorp Terminal style for your shell☆41Jun 3, 2016Updated 9 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆164May 2, 2024Updated last year
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆16Nov 11, 2016Updated 9 years ago
- This tool scans for a number of common, vulnerable components (openssl, libpng, libxml2, expat and a few others) to let you know if your …☆16Mar 24, 2021Updated 4 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Aug 7, 2024Updated last year
- Proactively-secure Accumulo with Cryptographic Enforcement (PACE) adds client-side encryption and signatures to Accumulo.☆15Aug 15, 2023Updated 2 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆45Jul 19, 2021Updated 4 years ago
- The Dictionary service provides access to the data dictionary and edge dictionary. These services provide metadata about fields that are …☆23Mar 11, 2025Updated 11 months ago
- QGIS Lock Zoom to Tile Scale☆21Jun 10, 2024Updated last year
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆80Nov 29, 2016Updated 9 years ago
- ☆18Feb 9, 2025Updated last year
- QGIS conversion tools to display the local date, time, time zone, convert between UNIX time (Epoch), Julian dates, ISO8601, calculate the…☆24Jun 10, 2024Updated last year
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆207Updated this week
- SkillTree☆26Feb 11, 2026Updated 2 weeks ago
- Chrome extension tool for OSINT & Recon☆57Mar 12, 2024Updated last year
- Wifi network scanning tool for capturing WPA/WPA2 Handshakes☆27Jan 19, 2021Updated 5 years ago
- CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.☆36Sep 14, 2025Updated 5 months ago
- Helm chart for Open Cyber Threat Intelligence Platform☆35Updated this week
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆36May 1, 2025Updated 10 months ago
- Distributed P2P Data-driven Workflow Framework☆278Feb 23, 2026Updated last week
- Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in suppo…☆1,033Feb 24, 2020Updated 6 years ago
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆883Nov 17, 2020Updated 5 years ago
- Tool Bash para automatizar y penetrar fallas de SQL en sitios webs.☆28Jun 4, 2025Updated 8 months ago
- Automate the delivery of your macOS applications outside the App Store.☆13Jul 8, 2024Updated last year