Threat Specification Language
☆28Oct 6, 2015Updated 10 years ago
Alternatives and similar repositories for threatspec
Users that are interested in threatspec are comparing it to the libraries listed below
Sorting:
- Testing for the Cloud☆19Jan 12, 2020Updated 6 years ago
- ☆17Mar 22, 2018Updated 7 years ago
- ☆15Apr 5, 2016Updated 9 years ago
- ⛔ DEPRECATED: A secure jenkins installation☆17Jul 23, 2019Updated 6 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Oct 12, 2015Updated 10 years ago
- Chef Cookbook for Atlassian Stash☆37Oct 9, 2018Updated 7 years ago
- ☆18Apr 12, 2021Updated 4 years ago
- A Java Web Application with common legacy security flaws for tests with Arachni Scanner and ModSecurity☆21Jul 3, 2024Updated last year
- Forms, emails, and checklists to help with onboarding☆26Sep 6, 2018Updated 7 years ago
- A Chef Repository For Pantry☆22Apr 18, 2016Updated 9 years ago
- Cookbook to install and configure a full set of Chef services☆20May 8, 2017Updated 8 years ago
- Incident Response Scripts☆30Mar 1, 2020Updated 6 years ago
- Development repository for the ossec cookbook☆44Updated this week
- Mini identity server that queries your router to find out who's in the office☆45Apr 27, 2020Updated 5 years ago
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- Agile metrics tools allows you to track metrics from different sources in order to identify trends and patterns on how your team performa…☆11Feb 13, 2026Updated 3 weeks ago
- ☆10May 25, 2021Updated 4 years ago
- Script to make RSA authentication key generation on Yubikeys differently painful☆28Sep 23, 2015Updated 10 years ago
- A simple tool for converting Rego (OPA) rule into command.☆30Jun 1, 2022Updated 3 years ago
- Evident Security Platform Custom Signatures Samples☆28Apr 17, 2019Updated 6 years ago
- A cookbook generator for Chef.☆30Mar 19, 2021Updated 4 years ago
- This is a Tamarin model of TLS 1.3☆42Aug 19, 2023Updated 2 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- Threatbutt Suite☆37Jun 3, 2015Updated 10 years ago
- Darkfiles finds orphaned files in container images and makes them to bad deeds☆42May 11, 2023Updated 2 years ago
- main website for the cantstopcolumbus movement☆12Mar 9, 2021Updated 4 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Zenhub automations☆12Dec 9, 2022Updated 3 years ago
- Content for 'Measuring Software Quality using Application Security' book published at LeanPub☆39Nov 6, 2016Updated 9 years ago
- GitHub action that checks if there has been any new commit in a given time frame☆10Oct 1, 2024Updated last year
- ☆12Aug 24, 2014Updated 11 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- Secure access cloud terraform provider☆13Feb 24, 2026Updated last week
- DEPRECATED: Recipes to perform chef audit mode check for CIS Benchmarks☆29Oct 12, 2015Updated 10 years ago
- Random UI Fuzzer (Monkey-Fuzzer) for finding bugs in Windows Forms☆10Oct 27, 2019Updated 6 years ago
- ☆12Mar 14, 2022Updated 3 years ago
- Brigade Project Index☆12Apr 3, 2023Updated 2 years ago
- Gem to download CloudWatch logs and upload to S3 for processing.☆11Jun 5, 2015Updated 10 years ago