redteam-project / compliantLinks
Ansible role for security standards compliance
☆13Updated 6 years ago
Alternatives and similar repositories for compliant
Users that are interested in compliant are comparing it to the libraries listed below
Sorting:
- Containerized pentesting tools☆45Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 4 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- introduction to distributed scanning using vultr☆11Updated 8 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- Ansible role that configures a host to be a target in a cyber range☆15Updated 6 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- This repo contains workshop material delivered at #nullcon2020☆15Updated 5 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- List CVEs and details that apply to your infrastructure (pre-inventoried).☆10Updated 4 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 5 years ago
- ☆32Updated 7 years ago
- Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.☆13Updated 3 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Updated 6 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 8 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- ☆14Updated 7 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- An nmap script to produce target lists for use with various tools.☆34Updated 4 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last week
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- ☆11Updated 8 years ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago