pki-io / threatspecView external linksLinks
Threat Specification Language
☆28Oct 6, 2015Updated 10 years ago
Alternatives and similar repositories for threatspec
Users that are interested in threatspec are comparing it to the libraries listed below
Sorting:
- Light weight cookbook resolver☆32Jun 29, 2018Updated 7 years ago
- Testing for the Cloud☆19Jan 12, 2020Updated 6 years ago
- ☆17Mar 22, 2018Updated 7 years ago
- ☆15Apr 5, 2016Updated 9 years ago
- ⛔ DEPRECATED: A secure jenkins installation☆17Jul 23, 2019Updated 6 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Oct 12, 2015Updated 10 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- Chef Cookbook for Atlassian Stash☆37Oct 9, 2018Updated 7 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Forms, emails, and checklists to help with onboarding☆26Sep 6, 2018Updated 7 years ago
- ☆18Apr 12, 2021Updated 4 years ago
- A Java Web Application with common legacy security flaws for tests with Arachni Scanner and ModSecurity☆21Jul 3, 2024Updated last year
- A Chef Repository For Pantry☆22Apr 18, 2016Updated 9 years ago
- Development repository for the ossec cookbook☆44Nov 20, 2025Updated 2 months ago
- Incident Response Scripts☆30Mar 1, 2020Updated 5 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Mini identity server that queries your router to find out who's in the office☆45Apr 27, 2020Updated 5 years ago
- ☆10May 25, 2021Updated 4 years ago
- Agile metrics tools allows you to track metrics from different sources in order to identify trends and patterns on how your team performa…☆11Jan 2, 2026Updated last month
- Script to make RSA authentication key generation on Yubikeys differently painful☆28Sep 23, 2015Updated 10 years ago
- A simple tool for converting Rego (OPA) rule into command.☆30Jun 1, 2022Updated 3 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Aug 16, 2016Updated 9 years ago
- This is a Tamarin model of TLS 1.3☆41Aug 19, 2023Updated 2 years ago
- Evident Security Platform Custom Signatures Samples☆28Apr 17, 2019Updated 6 years ago
- A cookbook generator for Chef.☆30Mar 19, 2021Updated 4 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- Threatbutt Suite☆37Jun 3, 2015Updated 10 years ago
- Darkfiles finds orphaned files in container images and makes them to bad deeds☆42May 11, 2023Updated 2 years ago
- main website for the cantstopcolumbus movement☆12Mar 9, 2021Updated 4 years ago
- ☆12Aug 24, 2014Updated 11 years ago
- Deploy Backup and DR appliances☆12Jan 29, 2026Updated 2 weeks ago
- Maltego Transforms to Query Traffic Records☆34Oct 13, 2015Updated 10 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Clojure client for Open Policy Agent☆11Dec 12, 2025Updated 2 months ago
- subset-Prolog-like DSL running on Factor☆10Apr 7, 2020Updated 5 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- Content for 'Measuring Software Quality using Application Security' book published at LeanPub☆39Nov 6, 2016Updated 9 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆45Sep 12, 2016Updated 9 years ago
- DEPRECATED: Recipes to perform chef audit mode check for CIS Benchmarks☆29Oct 12, 2015Updated 10 years ago