postmodern / phishing-training-sigs
A crowd sourced list of phishing training simulators and their signatures
☆18Updated 8 months ago
Alternatives and similar repositories for phishing-training-sigs:
Users that are interested in phishing-training-sigs are comparing it to the libraries listed below
- Manage a uniform team of security managers for every organization in your enterprise☆17Updated 6 months ago
- fqdn_parser (Fully Qualified Domain Name Parser) is a library for parsing FQDNs into their component parts, as well as providing addition…☆27Updated 6 months ago
- A mirror of ISM OSCAL documents. The authoritative source can be found at https://www.cyber.gov.au/ism/oscal.☆28Updated 2 months ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆88Updated 6 years ago
- Scans npmjs.org for npm packages that can be taken over☆19Updated 2 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆19Updated this week
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 4 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 3 months ago
- Remove all resources from an Azure Tenant and it's Subscriptions.☆42Updated this week
- Knowledge Report Alert & Normalization Generator☆27Updated 11 months ago
- ☆77Updated 2 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- Scanner to identify dangling DNS records and subdomain takeovers☆41Updated 2 months ago
- ☆26Updated 3 months ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- Framework for API Maturity Assessment☆20Updated 5 years ago
- ☆18Updated 3 years ago
- Fun tools around the EBS Direct API☆18Updated 3 years ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆25Updated last year
- OpenVPN road warrior installer for Debian, Ubuntu and CentOS☆30Updated 6 years ago
- A canary designed to minimize the impact from certain Ransomware actors☆98Updated 3 years ago
- 🏰 A Python script for AWS S3 bucket enumeration.☆53Updated 4 years ago
- Identify IP addresses owned by public cloud providers☆116Updated 7 months ago
- Infrastructure as code for deploying Panther☆10Updated this week
- ☆159Updated last year
- ☆42Updated last year
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆215Updated 2 weeks ago
- Bits of Terraform that you can use to do bad things in CI/CD pipelines that run Terraform☆10Updated 4 years ago