nsacyber / Blocking-Outdated-Web-TechnologiesLinks
Guidance for blocking outdated web technologies. #nsacyber
☆63Updated 4 years ago
Alternatives and similar repositories for Blocking-Outdated-Web-Technologies
Users that are interested in Blocking-Outdated-Web-Technologies are comparing it to the libraries listed below
Sorting:
- Logs key Windows process performance metrics. #nsacyber☆68Updated 3 years ago
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆82Updated 8 years ago
- Configuration guidance for implementing BitLocker. #nsacyber☆126Updated 6 years ago
- Submits multiple domains to VirusTotal API☆59Updated 4 years ago
- ☆94Updated this week
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆113Updated 4 years ago
- Search a filesystem for indicators of compromise (IoC).☆81Updated 3 weeks ago
- CSI SIEM☆109Updated 3 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆34Updated 3 years ago
- Gather Open-Source Intelligence using PowerShell.☆177Updated 6 years ago
- an awesome list of active defense resources☆127Updated 5 years ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆143Updated 2 years ago
- Scan git repos for secrets using regex and entropy 🔑☆10Updated 5 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆52Updated 3 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Updated 4 years ago
- ☆21Updated 2 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆67Updated 4 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Updated 11 months ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated 3 weeks ago
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- Automatically exported from code.google.com/p/nipper-ng☆73Updated 3 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- An analytical framework for network traffic and behavioral analytics☆22Updated 2 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆257Updated 2 years ago
- PowerShell Module to interact with the Shodan service☆145Updated 9 years ago
- Alienvault OTX TAXII connector☆56Updated 8 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- Maltego transform for visualizing Nessus scan data☆45Updated 6 years ago
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆51Updated 4 months ago
- Files vetted, and approved for public release☆55Updated 2 years ago