nsacyber / Blocking-Outdated-Web-TechnologiesLinks
Guidance for blocking outdated web technologies. #nsacyber
☆58Updated 3 years ago
Alternatives and similar repositories for Blocking-Outdated-Web-Technologies
Users that are interested in Blocking-Outdated-Web-Technologies are comparing it to the libraries listed below
Sorting:
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆76Updated 7 years ago
- Logs key Windows process performance metrics. #nsacyber☆66Updated 2 years ago
- Configuration guidance for implementing BitLocker. #nsacyber☆121Updated 5 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆110Updated 4 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆56Updated 6 years ago
- Scan git repos for secrets using regex and entropy 🔑☆10Updated 5 years ago
- WALKOFF-enabled applications. #nsacyber☆144Updated 6 years ago
- Various components we use in labs☆10Updated 4 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆41Updated 2 months ago
- Search a filesystem for indicators of compromise (IoC).☆74Updated last week
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆37Updated 5 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Defensive Origins Training Schedule☆38Updated last year
- Helpful tools for interacting with a GoPhish phishing instance☆48Updated last week
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆44Updated 3 years ago
- Threathunt details for the Solarwinds compromise☆33Updated 4 years ago
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆24Updated 11 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- ☆39Updated 4 years ago
- OSINT tool to evaluate the trustworthiness of a company☆42Updated 5 years ago
- ☆54Updated 4 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 4 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated this week
- Tool used to perform threat intelligence against packet data☆35Updated 5 months ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- SANS Slingshot Linux Distribution☆51Updated 4 years ago
- Security Assessment Data Management and Analysis Tool☆39Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆76Updated 9 years ago