nsacyber / Blocking-Outdated-Web-Technologies
Guidance for blocking outdated web technologies. #nsacyber
☆57Updated 3 years ago
Alternatives and similar repositories for Blocking-Outdated-Web-Technologies:
Users that are interested in Blocking-Outdated-Web-Technologies are comparing it to the libraries listed below
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆75Updated 7 years ago
- Logs key Windows process performance metrics. #nsacyber☆66Updated 2 years ago
- Supporting files for cyber challenge exercises. #nsacyber☆45Updated 6 years ago
- Configuration guidance for implementing BitLocker. #nsacyber☆120Updated 5 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- A WikiLeaks scraper inspired by the Datasploit module previously written in Python2. This script leverages pandas and Python3.☆40Updated 9 months ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆55Updated 6 years ago
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆107Updated 4 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆48Updated 2 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆43Updated 3 years ago
- ☆40Updated 4 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Gather Open-Source Intelligence using PowerShell.☆170Updated 5 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆22Updated 3 years ago
- A curated list of Awesome Threat Intelligence resources☆47Updated 6 years ago
- An analytical framework for network traffic and behavioral analytics☆22Updated 2 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 5 years ago
- Search a filesystem for indicators of compromise (IoC).☆70Updated last month
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆36Updated 5 years ago
- Automated pshtt, trustymail, and sslyze scanning☆24Updated last month
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 2 years ago
- ☆54Updated 3 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Creates a code.gov code inventory JSON file based on GitHub repository information. #nsacyber☆24Updated 6 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 2 months ago
- Files vetted, and approved for public release☆53Updated last year
- Python3 library and command line for GreyNoise☆152Updated 2 weeks ago
- ☆21Updated last year
- A curated list of awesome threat detection and hunting resources☆16Updated 6 years ago