nsacyber / Blocking-Outdated-Web-Technologies
Guidance for blocking outdated web technologies. #nsacyber
☆55Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Blocking-Outdated-Web-Technologies
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆71Updated 7 years ago
- Logs key Windows process performance metrics. #nsacyber☆64Updated last year
- Configuration guidance for implementing BitLocker. #nsacyber☆120Updated 5 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆39Updated 3 years ago
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆104Updated 3 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 6 months ago
- Supporting files for cyber challenge exercises. #nsacyber☆44Updated 6 years ago
- ☆53Updated 3 years ago
- Defensive Origins Training Schedule☆35Updated 10 months ago
- Search a filesystem for indicators of compromise (IoC).☆68Updated 2 months ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆31Updated last year
- ☆21Updated last year
- Scapy packet fragment reassembly engines☆34Updated 3 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆21Updated 3 years ago
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆36Updated 4 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆66Updated last year
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 4 years ago
- ☆11Updated 3 years ago
- A curated list of Awesome Threat Intelligence resources☆46Updated 6 years ago
- An analytical framework for network traffic and behavioral analytics☆22Updated last year
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 5 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 5 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆66Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated 10 months ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆25Updated 6 months ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆90Updated 3 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆44Updated last year