nsacyber / Blocking-Outdated-Web-TechnologiesLinks
Guidance for blocking outdated web technologies. #nsacyber
☆63Updated 3 years ago
Alternatives and similar repositories for Blocking-Outdated-Web-Technologies
Users that are interested in Blocking-Outdated-Web-Technologies are comparing it to the libraries listed below
Sorting:
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆81Updated 7 years ago
- Configuration guidance for implementing BitLocker. #nsacyber☆126Updated 6 years ago
- Logs key Windows process performance metrics. #nsacyber☆68Updated 2 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆113Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆44Updated 4 years ago
- Gather Open-Source Intelligence using PowerShell.☆177Updated 5 years ago
- ☆36Updated 4 years ago
- an awesome list of active defense resources☆125Updated 5 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated last year
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- ☆21Updated 2 years ago
- Scan git repos for secrets using regex and entropy 🔑☆10Updated 5 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 3 years ago
- CSI SIEM☆110Updated 2 years ago
- SANS Slingshot Linux Distribution☆53Updated 4 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 7 months ago
- Search a filesystem for indicators of compromise (IoC).☆80Updated last month
- ☆90Updated this week
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆143Updated last year
- Monitor geotagged social media from multiple platforms in real time.☆77Updated 6 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated 2 weeks ago
- An analytical framework for network traffic and behavioral analytics☆22Updated 2 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 7 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆93Updated 5 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- ☆39Updated 4 years ago