redteam-project / compliantLinks
Ansible role for security standards compliance
☆13Updated 6 years ago
Alternatives and similar repositories for compliant
Users that are interested in compliant are comparing it to the libraries listed below
Sorting:
- A few quick recipes for those that do not have much time during the day☆22Updated 8 months ago
- ☆29Updated this week
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- Containerized pentesting tools☆45Updated 3 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated last year
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- Quantitate binary risk assessment☆16Updated 3 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- ☆11Updated 8 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 4 years ago
- Restructured and Collaborated SIEM and CVSS Infrastructure. Presented at Blackhat Asia Arsenal 2020.☆4Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 4 years ago
- Windows Security Logging☆43Updated 2 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- ☆15Updated 3 years ago
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆24Updated 8 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Updated 8 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 5 months ago