nsacyber / Blocking-Outdated-Web-Technologies
Guidance for blocking outdated web technologies. #nsacyber
☆57Updated 3 years ago
Alternatives and similar repositories for Blocking-Outdated-Web-Technologies
Users that are interested in Blocking-Outdated-Web-Technologies are comparing it to the libraries listed below
Sorting:
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆75Updated 7 years ago
- Configuration guidance for implementing BitLocker. #nsacyber☆120Updated 5 years ago
- Logs key Windows process performance metrics. #nsacyber☆66Updated 2 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- Search a filesystem for indicators of compromise (IoC).☆71Updated 3 months ago
- ☆39Updated 4 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆36Updated 5 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- CSI SIEM☆110Updated 2 years ago
- Automated pshtt, trustymail, and sslyze scanning☆27Updated last month
- A WikiLeaks scraper inspired by the Datasploit module previously written in Python2. This script leverages pandas and Python3.☆40Updated 11 months ago
- Creates a code.gov code inventory JSON file based on GitHub repository information. #nsacyber☆25Updated 6 years ago
- Alienvault OTX TAXII connector☆56Updated 8 years ago
- an awesome list of active defense resources☆120Updated 4 years ago
- ☆54Updated 3 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆55Updated 6 years ago
- Maltego transform for visualizing Nessus scan data☆47Updated 5 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 4 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆43Updated 3 years ago
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆109Updated 4 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 5 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 3 months ago
- CARET - A tool for viewing cyber analytic relationships☆54Updated 5 years ago
- Threathunt details for the Solarwinds compromise☆33Updated 3 years ago
- ☆21Updated 2 years ago
- A list of Autopsy awesome plugins.☆74Updated 3 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆41Updated 3 weeks ago
- Threat Hunter's Knowledge Base☆22Updated 3 years ago