postmodern / phishing-training-sigsLinks
A crowd sourced list of phishing training simulators and their signatures
☆19Updated last year
Alternatives and similar repositories for phishing-training-sigs
Users that are interested in phishing-training-sigs are comparing it to the libraries listed below
Sorting:
- Russian Keyboard Registry Script☆115Updated 4 years ago
- Parse your LastPass vault and export to CSV files☆125Updated last year
- ☆74Updated last week
- Qualys community open source scripts. Please note these are provided as-is and are not supported.☆111Updated last year
- Mirror of cisa.gov/kev data files☆54Updated last week
- the UNOFFICIAL (but useful) Python library for the Rapid7 InsightVM/Nexpose RESTful API☆78Updated 11 months ago
- ☆77Updated 2 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 3 weeks ago
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 3 years ago
- fqdn_parser (Fully Qualified Domain Name Parser) is a library for parsing FQDNs into their component parts, as well as providing addition…☆27Updated last year
- ☆67Updated last month
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 5 years ago
- Scripts, SQL queries, and other resources for Nexpose☆28Updated 6 months ago
- Awesome Video Chat Backgrounds☆108Updated 3 years ago
- ☆33Updated 3 years ago
- Minimum Viable Secure Product mvsp.dev☆202Updated 8 months ago
- ☆119Updated last year
- Coding samples using the Kenna Security Platform REST API. All the code samples in this GitHub repository are offered “as is” and include…☆31Updated last month
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- Security policies for Tailscale☆299Updated 4 months ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆256Updated 9 months ago
- Recon tool to query cloud prefixes for services associated with an IP address☆24Updated 11 months ago
- ☆12Updated 8 years ago
- Browser extension for examining SAML messages☆164Updated last month
- Global Security Database Project☆28Updated 2 years ago
- Scans npmjs.org for npm packages that can be taken over☆19Updated 3 years ago
- Unleash the power of the Falcon Platform at the CLI☆123Updated 3 weeks ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Updated 2 years ago