Threat Specification Language
☆28Oct 6, 2015Updated 10 years ago
Alternatives and similar repositories for threatspec
Users that are interested in threatspec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Mar 22, 2018Updated 8 years ago
- ☆15Apr 5, 2016Updated 9 years ago
- ⛔ DEPRECATED: A secure jenkins installation☆17Jul 23, 2019Updated 6 years ago
- A data scraping framework based on Open Civic Data's Pupa☆67Mar 3, 2020Updated 6 years ago
- Chef Cookbook for Atlassian Stash☆36Oct 9, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Chef Repository For Pantry☆22Apr 18, 2016Updated 9 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Mar 6, 2018Updated 8 years ago
- Mini identity server that queries your router to find out who's in the office☆45Apr 27, 2020Updated 5 years ago
- ☆18Apr 12, 2021Updated 4 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Oct 12, 2015Updated 10 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Jun 30, 2015Updated 10 years ago
- ☆10Aug 2, 2016Updated 9 years ago
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Script to make RSA authentication key generation on Yubikeys differently painful☆28Sep 23, 2015Updated 10 years ago
- Knife plugin for Chef to draw dependency graphs for roles. Cut through the spaghetti with a knife.☆65Nov 3, 2018Updated 7 years ago
- Onyx Boox templates I made☆15Jan 25, 2021Updated 5 years ago
- Forms, emails, and checklists to help with onboarding☆26Sep 6, 2018Updated 7 years ago
- Torrent RSS scraper☆18Sep 26, 2011Updated 14 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 6 years ago
- A Java library for parsing and programmatically using threat models☆82Feb 15, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A multitenant, horizontally scalable Prometheus as a Service☆12Sep 14, 2016Updated 9 years ago
- Cookbook to install and configure a full set of Chef services☆20May 8, 2017Updated 8 years ago
- Darkfiles finds orphaned files in container images and makes them to bad deeds☆42May 11, 2023Updated 2 years ago
- ☆12Aug 7, 2018Updated 7 years ago
- vmware userland helper☆16May 14, 2020Updated 5 years ago
- A terraform provider for Proxmox☆13Apr 29, 2016Updated 9 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆45Sep 12, 2016Updated 9 years ago
- An apt repository server,☆19Jun 28, 2016Updated 9 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆142Apr 29, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Day One <- Twitter☆11Nov 20, 2020Updated 5 years ago
- A simple tool for converting Rego (OPA) rule into command.☆30Jun 1, 2022Updated 3 years ago
- Grail+ is a set of command line tools for manipulating non-deterministic finite automata (NFAs), non-deterministic pushdown automata (PDA…☆10Oct 22, 2016Updated 9 years ago
- Produce ASCII graphs of data logged by sar/syshot☆19May 19, 2011Updated 14 years ago
- ☆31Nov 13, 2014Updated 11 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- The JIRA HTTP Authenticator☆12Apr 23, 2021Updated 4 years ago